Re: draft-bonica-6man-frag-deprecate
Brian E Carpenter <brian.e.carpenter@gmail.com> Fri, 28 June 2013 20:48 UTC
Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CF1121F9C63 for <ipv6@ietfa.amsl.com>; Fri, 28 Jun 2013 13:48:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cIYV8y-zkpvx for <ipv6@ietfa.amsl.com>; Fri, 28 Jun 2013 13:48:48 -0700 (PDT)
Received: from mail-pb0-x234.google.com (mail-pb0-x234.google.com [IPv6:2607:f8b0:400e:c01::234]) by ietfa.amsl.com (Postfix) with ESMTP id BA73A21F9A4B for <ipv6@ietf.org>; Fri, 28 Jun 2013 13:48:48 -0700 (PDT)
Received: by mail-pb0-f52.google.com with SMTP id xa12so2673668pbc.11 for <ipv6@ietf.org>; Fri, 28 Jun 2013 13:48:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:organization:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=bCq4N+nNnNfFoEpTIhuE6/7KDKRnvBO3p1zFIqEahVI=; b=nkIed3NpoG7LzApCezKFG6U6jhCZKf0Ot6tBZwPIjzrB9EntcoFpxcDglSHblNl+1t eZWyrHVV4fZMxbK1OJc8aBdpYqCeN2E2qBkvdM5tnQHP7Le7ga8x8O11YzvSUmDn+3z6 E66dEfRXCryXPpgF8dnxs9srA6G++vyzHKObEEVoy51jxlTa+KxAeIqZ/T7EQQOKDsLq mXOy3oyBtf7ZlOGoKc7NGQWx6cMXuCF8ODGiuPfD/Hv0q41Dr1HnQCkAJq/MOAMXl7+F 8PabMU+Q4PtvwlG01NMCHRbBOun1mrC52F0JyyWwE0XUDE0ZzCxdNVtp1Ri7W+AMa5ib gYsA==
X-Received: by 10.68.237.106 with SMTP id vb10mr13244881pbc.131.1372452528363; Fri, 28 Jun 2013 13:48:48 -0700 (PDT)
Received: from [192.168.178.22] (10.198.69.111.dynamic.snap.net.nz. [111.69.198.10]) by mx.google.com with ESMTPSA id z5sm9678817pbk.0.2013.06.28.13.48.46 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 28 Jun 2013 13:48:47 -0700 (PDT)
Message-ID: <51CDF6BA.3010904@gmail.com>
Date: Sat, 29 Jun 2013 08:48:58 +1200
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
User-Agent: Thunderbird 2.0.0.6 (Windows/20070728)
MIME-Version: 1.0
To: Havard Eidnes <he@uninett.no>
Subject: Re: draft-bonica-6man-frag-deprecate
References: <20130628.152526.152295907.he@uninett.no>
In-Reply-To: <20130628.152526.152295907.he@uninett.no>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Cc: ipv6@ietf.org
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jun 2013 20:48:49 -0000
On 29/06/2013 01:25, Havard Eidnes wrote: > Hi, > > some comments from this corner, some small, some not so...: > > > In section 1: > > MTU is a unidirectional metric. A bidirectional link may be > characterized by one MTU in the forward direction and another > MTU in the reverse direction. > > I'm sure this is formally true. However, in practice, I have > never seen a router where you can separately configure the > receive and transmit MTU. So ... I would remove this altogether; > it may otherwise pave the way for unsuspecting individuals > reading this to create a path MTU discovery black hole by > configuring inconsistent MTUs for devices on the same link. True, but of course *path* MTU may well be unidirectional, if the forward and reverse paths are different. PMTUD definitely has to allow for asymmetry, which is what counts for fragmentation. Brian > > > In section 2.1: > > [Kent87] points out that the reassembly process is resource > intensive. It consumes significant compute and memory resources. > > Is that argument still valid today? Is it impossible to engineer an > implementaiton which restricts the memory consumption in order to > improve robustness of the implementation? > > > Section 2.2 states "Fragmentation Is Rare". I think this will be > hihgly dependent on your choice of observation points. E.g. in the > vicinity of an NFS server serving using UDP, I would not be > surprised to see a lot of fragments. And, as has been mentioned > elsewhere in this discussion, in the vicinity of a DNSSEC-validating > recursive DNS resolver, you would expect to see an increasing > proportion of fragmented UDP traffic as DNSSEC deployment > progresses. > > > In section 2.2.1, the document appears to dismiss the DNSSEC use of > UDP and fragmentation with "use TCP instead". I beleive Mark > Andrews in <20130624030939.CA0DD363070C@drugs.dv.isc.org> stated why > this is far from good enough as an answer. In addition to TCP PMTUD > being too slow, you have the issue that TCP in general is about 3 > times slower than UDP in delivering a DNS response even if PMTUD is > not involved -- I beleive RIPE NCC Labs did a test using their "RIPE > Atlas" probes to check for this, and they came up with 2.5x - 3x as > the slowdown factor. Additionally there is the vastly increased > need to keep state in DNS name servers by the TCP load which would > result from the abolishment of UDP as a transport for DNS. > > On top of this, there is the argument that "firewalls and network > operators may filter DNS over TCP", but I would not use that as an > argument because I consider it invalid -- more on that below. > > > Section 2.3, "Attack vectors". Isn't this whole section giving bad > excuses to IP stack implementors for not providing a robust and > well-tested implementation?!? BTW, I'm wondering whether there is a > spec issue lurking within this area, wrt. invalidating the most > obscure corner cases? > > > Section 2.4, "Operator behavior". It is claimed that IPv6 fragments > are being dropped in several places, e.g. by enterprise firewalls or > other environments who want to tightly control what traffic is > passed. I claim that is's a matter of principle whether we let the > tail wag the dog. Firewall administrators or other users of the > network may do unwise things when configuring their device, but > should such behaviour be allowed to restrict what becomes > standardized?!? If that were the case, we might as well all > restrict ourselves to speaking TCP over port 80. > > > Section 3, "Recommendation". I question whether you can in fact > make the backward-incompatible change of getting rid of the need for > implementations to support fragment reassembly -- the genie is > already out of the bottle -- has been for quite a while, and I claim > it's already too late to try to put it back in. So some of the > claimed attack vectors in section 2.3 will also be difficult to get > rid of, as hosts will in all probability have to continue to support > fragment reassembly for quite a while. > > At the very least, there's a need to separate the recommendations > for "sending fragments" and "support reception of fragments". > > > Best regards, > > - HÃ¥vard > -------------------------------------------------------------------- > IETF IPv6 working group mailing list > ipv6@ietf.org > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 > -------------------------------------------------------------------- >
- draft-bonica-6man-frag-deprecate Havard Eidnes
- Re: draft-bonica-6man-frag-deprecate Brian E Carpenter