Re: New Version Notification for draft-bonica-6man-frag-deprecate-00.txt

james woodyatt <jhw@apple.com> Fri, 28 June 2013 19:22 UTC

Return-Path: <jhw@apple.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D2FA21F9C49 for <ipv6@ietfa.amsl.com>; Fri, 28 Jun 2013 12:22:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EQgNAfPTppQF for <ipv6@ietfa.amsl.com>; Fri, 28 Jun 2013 12:22:47 -0700 (PDT)
Received: from mail-out.apple.com (honeycrisp.apple.com [17.151.62.51]) by ietfa.amsl.com (Postfix) with ESMTP id EE56621F9C4C for <ipv6@ietf.org>; Fri, 28 Jun 2013 12:22:33 -0700 (PDT)
MIME-version: 1.0
Content-transfer-encoding: 7bit
Content-type: text/plain; CHARSET="US-ASCII"
Received: from relay7.apple.com ([17.128.113.101]) by mail-out.apple.com (Oracle Communications Messaging Server 7u4-23.01 (7.0.4.23.0) 64bit (built Aug 10 2011)) with ESMTP id <0MP400J7PB4EBEX0@mail-out.apple.com> for ipv6@ietf.org; Fri, 28 Jun 2013 12:21:56 -0700 (PDT)
X-AuditID: 11807165-b7f496d000000613-74-51cde25417f8
Received: from aniseed.apple.com (aniseed.apple.com [17.128.115.23]) (using TLS with cipher RC4-MD5 (128/128 bits)) (Client did not present a certificate) by relay7.apple.com (Apple SCV relay) with SMTP id C5.F7.01555.452EDC15; Fri, 28 Jun 2013 12:21:56 -0700 (PDT)
Received: from kallisti.apple.com ([17.193.13.64]) by aniseed.apple.com (Oracle Communications Messaging Server 7u4-24.01 (7.0.4.24.0) 64bit (built Nov 17 2011)) with ESMTPSA id <0MP400MBAB4JXJ60@aniseed.apple.com> for ipv6@ietf.org; Fri, 28 Jun 2013 12:21:56 -0700 (PDT)
Subject: Re: New Version Notification for draft-bonica-6man-frag-deprecate-00.txt
From: james woodyatt <jhw@apple.com>
In-reply-to: <CAKC-DJjw+3jSuf7SRnEY6c-1sCbJgdf40cRZnDs4ZvAPaEDQWA@mail.gmail.com>
Date: Fri, 28 Jun 2013 12:21:56 -0700
Message-id: <BF5BEF74-56C7-470D-9132-95EA0F0284F7@apple.com>
References: <2CF4CB03E2AA464BA0982EC92A02CE2509F85151@BY2PRD0512MB653.namprd05.prod.outlook.com> <51C32FA9.1090207@gmail.com> <2CF4CB03E2AA464BA0982EC92A02CE2509F85F38@BY2PRD0512MB653.namprd05.prod.outlook.com> <20130624204008.GB3647@virgo.local> <20130624205226.GC3647@virgo.local> <2CF4CB03E2AA464BA0982EC92A02CE2509F8761C@BY2PRD0512MB653.namprd05.prod.outlook.com> <51C902DC.9000408@gmail.com> <m24ncmaozs.wl%randy@psg.com> <2EA20F89-02F5-4D06-90EE-A7D2974045A3@employees.org> <m2li5yj7u3.wl%randy@psg.com> <3B0D9447-D39F-4165-9B43-019C3513101A@employees.org> <m2ip12j6d9.wl%randy@psg.com> <A0662700-628E-4032-89ED-6621B0867820@apple.com> <51CA2C56.1080809@gmail.com> <CAKC-DJjw+3jSuf7SRnEY6c-1sCbJgdf40cRZnDs4ZvAPaEDQWA@mail.gmail.com>
To: 6man <ipv6@ietf.org>
X-Mailer: Apple Mail (2.1782)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprNLMWRmVeSWpSXmKPExsUi2FAsrhvy6GygwePbUhYvz75ncmD0WLLk J1MAYxSXTUpqTmZZapG+XQJXxve3S5gK/slWfF/5n7GB8ZRYFyMnh4SAicTR23vYIWwxiQv3 1rN1MXJxCAn0M0m8PLmXCcKZziTRuWEZWBWzgI5E7/dvzCA2r4CexLznvWBxYYFgiR0HpzCB 2GwCKhLfLt8FszmB4u9ftYHVswioSiyac5QFYo62xJN3F1gh5thIHLp3GWrzb1aJ21deMIIk RAQkJK4tesQGcZ6sxLufsxgnMPLPQnLHLCR3zEIydwEj8ypGgaLUnMRKc73EgoKcVL3k/NxN jOAgK0zdwdi43OoQowAHoxIP74u5ZwOFWBPLiitzDzFKcDArifByzwMK8aYkVlalFuXHF5Xm pBYfYpTmYFES55XyOh4oJJCeWJKanZpakFoEk2Xi4JRqYBRx/LuOIfiMatLfHpHrVYz5PFc6 v+Z0yBtqnIpQFnu1pKqDKbnR9EzSTYbrWeYJKS6O1up8/2/sUo8W41zXNJ/5gX7GZE57XuHc yV8VTk5S0zKQeNFeF/gm7qi6Ss7kKVzmvdOFum66WR7bscnlyP+p+RKCk+8vCrYJTbg4n1O4 iOVyR6C4EktxRqKhFnNRcSIASwBxPS4CAAA=
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jun 2013 19:22:57 -0000

On Jun 28, 2013, at 08:36 , Erik Nygren <erik+ietf@nygren.org> wrote:
> [...]
> As such, I agree with other comments that it's important
> to re-emphasize that any environment that both blocks ICMPv6 PTB
> and at the same time doesn't allow 1500 byte packets through is broken
> and needs to get fixed.  This also means that anyone deploying
> or implementing a tunnel (or VPN) needs to carefully consider
> how they'll deal with this.
> [...]

And this is where I point at RFC 2473 "Generic Packet Tunneling in IPv6" section 7.2 "IPv4 Tunnel Packet Fragmentation" which I will quote for handy reference below:

>> 7.2 IPv4 Tunnel Packet Fragmentation
>> 
>>    When an IPv4 original packet enters a tunnel, if the original packet
>>    size exceeds the tunnel MTU (i.e., the Path MTU between the tunnel
>>    entry-point and the tunnel exit-point, minus the size of the tunnel
>>    header(s)), it is handled as follows:
>> 
>>         (a)  if in the original IPv4 packet header the Don't Fragment  -
>>              DF - bit flag is SET, the entry-point node discards the
>>              packet and returns an ICMP message.  The ICMP message has
>>              the type = "unreachable", the code = "packet too big", and
>>              the recommended MTU size field set to the size of the
>>              tunnel MTU - see sections 6.7 and 8.3.
>> 
>>         (b)  if in the original packet header the Don't Fragment - DF  -
>>              bit flag is CLEAR, the tunnel entry-point node encapsulates
>>              the original packet, and subsequently fragments the
>>              resulting IPv6 tunnel packet into IPv6 fragments that do
>>              not exceed the Path MTU to the tunnel exit-point.

This is cited in RFC 6333 "Dual-stack Lite" section 5.3 "Fragmentation and Reassembly" which I will also quote for handy reference:

>> 5.3.  Fragmentation and Reassembly
>> 
>>    Using an encapsulation (IPv4-in-IPv6 or anything else) to carry IPv4
>>    traffic over IPv6 will reduce the effective MTU of the datagram.
>>    Unfortunately, path MTU discovery [RFC1191] is not a reliable method
>>    to deal with this problem.
>> 
>>    A solution to deal with this problem is for the service provider to
>>    increase the MTU size of all the links between the B4 element and the
>>    AFTR elements by at least 40 bytes to accommodate both the IPv6
>>    encapsulation header and the IPv4 datagram without fragmenting the
>>    IPv6 packet.
>> 
>>    However, as not all service providers will be able to increase their
>>    link MTU, the B4 element MUST perform fragmentation and reassembly if
>>    the outgoing link MTU cannot accommodate the extra IPv6 header.  The
>>    original IPv4 packet is not oversized.  The packet is oversized after
>>    the IPv6 encapsulation.  The inner IPv4 packet MUST NOT be
>>    fragmented.  Fragmentation MUST happen after the encapsulation of the
>>    IPv6 packet.  Reassembly MUST happen before the decapsulation of the
>>    IPv4 packet.  A detailed procedure has been specified in [RFC2473]
>>    Section 7.2.

Clearly, this proposal to deprecate IPv6 fragmentation headers entails an update to RFC 2473 and RFC 6333 as well as RFC 2460.  The procedure for encapsulating IPv4 packets with DF=0 in IPv6 tunnels where the path MTU is less than typical IPv4 path MTU currently requires tunnel endpoints to use IPv6 fragment headers. I guess they have to stop doing that if this RFC is published.

I'm also excited to learn about how we're going to add PLPMTUD to GRE and tunnel-mode IPsec ESP so they have some hope of using path MTU larger than 1280 octets.


--
james woodyatt <jhw@apple.com>
core os networking