Re: Non-Last Small IPv6 Fragments

Mark Andrews <marka@isc.org> Mon, 14 January 2019 20:19 UTC

Return-Path: <marka@isc.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4787C1312AB for <ipv6@ietfa.amsl.com>; Mon, 14 Jan 2019 12:19:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level:
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BMVLukafQOXR for <ipv6@ietfa.amsl.com>; Mon, 14 Jan 2019 12:19:07 -0800 (PST)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.64.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F8011312A7 for <ipv6@ietf.org>; Mon, 14 Jan 2019 12:19:06 -0800 (PST)
Received: from zmx1.isc.org (zmx1.isc.org [149.20.0.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.pao1.isc.org (Postfix) with ESMTPS id 334623AB003; Mon, 14 Jan 2019 20:19:06 +0000 (UTC)
Received: from zmx1.isc.org (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTPS id 018F31600A6; Mon, 14 Jan 2019 20:19:06 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTP id E70251600A5; Mon, 14 Jan 2019 20:19:05 +0000 (UTC)
Received: from zmx1.isc.org ([127.0.0.1]) by localhost (zmx1.isc.org [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id BCxrOHfG13Cc; Mon, 14 Jan 2019 20:19:05 +0000 (UTC)
Received: from [172.30.42.67] (c27-253-115-14.carlnfd2.nsw.optusnet.com.au [27.253.115.14]) by zmx1.isc.org (Postfix) with ESMTPSA id C9D2C160053; Mon, 14 Jan 2019 20:19:04 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Subject: Re: Non-Last Small IPv6 Fragments
From: Mark Andrews <marka@isc.org>
In-Reply-To: <CALx6S37YwRWiV5k3W3tBE5OmLc2=f_1Azh6LFTO7jMOKr1D1wg@mail.gmail.com>
Date: Tue, 15 Jan 2019 07:19:02 +1100
Cc: "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net>, IPv6 List <ipv6@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <C59DC868-2A95-4B85-B0B0-6C82A3393B17@isc.org>
References: <CAOSSMjV0Vazum5OKztWhAhJrjLjXc5w5YGxdzHgbzi7YVSk7rg@mail.gmail.com> <CALx6S37TJr++fC=pVoeS=mrO1fHc4gL_Wtu-XkVTswzs2XxXCA@mail.gmail.com> <CALx6S36V7vrVyoTP0G6+S5XeFNB3KWS5UaNnVi20xogRERdCfg@mail.gmail.com> <973A1649-55F6-4D97-A97F-CEF555A4D397@employees.org> <CALx6S34YbBe8xBod3VsWVO33TpZcdxh2uV1vaO8Z_NKnVXp66g@mail.gmail.com> <A3C3F9C0-0A07-41AF-9671-B9E486CB8246@employees.org> <AEA47E27-C0CB-4ABE-8ADE-51E9D599EF8F@gmail.com> <6aae7888-46a4-342d-1d76-10f8b50cebc4@gmail.com> <EC9CC5FE-5215-4105-8A34-B3F123D574B9@employees.org> <4c56f504-7cd7-6323-b14a-d34050d13f4e@foobar.org> <9E6D4A6E-8ABA-4BAB-BEC5-969078323C96@employees.org> <CAAedzxpdF+yhBXfnwUcaQb-HkgdaqXRU3L+S7v8sS1F0OkwM9A@mail.gmail.com> <78a8a0e0-8808-364c-41f7-f81f90362432@gont.com.ar> <CALx6S37YnSbOUgVoWEA46aN88a3CfERWemhQKi_GOrP_g+=rFQ@mail.gmail.com> <308d9dff-87c4-cc63-6792-fcbfce722d1e@gont.com.ar> <CALx6S34kseXuKrrbB44=wz7OQBysUmbJh++N79Da9Kx1rseAUw@mail.gmail.com> <3f87c4ec-636a-790e-0a6a-0a6b4c2f3a35@foobar.org> <046F449C-E19E-4891-968E-975A03162364@lists.zabbadoz.net> <CALx6S37YwRWiV5k3W3tBE5OmLc2=f_1Azh6LFTO7jMOKr1D1wg@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/YVRhVEzT5n6RmkJSgkQ6h84hw7E>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Jan 2019 20:19:09 -0000


> On 15 Jan 2019, at 6:06 am, Tom Herbert <tom@herbertland.com> wrote:
> 
> On Mon, Jan 14, 2019 at 10:40 AM Bjoern A. Zeeb
> <bzeeb-lists@lists.zabbadoz.net> wrote:
>> 
>> On 14 Jan 2019, at 18:12, Nick Hilliard wrote:
>> 
>>> Tom Herbert wrote on 14/01/2019 17:58:
>>>> I don't know what it means to "reassemble fragments in the network".
>>>> Reassembly is specified as an operation at destination end points.
>>> 
>>> some types of stateful middleboxes do in-line reassembly.
>>> 
>>> There are many horrors on the Internet.
>> 
>> And maybe it’s time to call them out, say screw them, and either
>> people have to live with broken stuff or get end-to-end connectivity
>> again.   Maybe it’s time to stop catering for the brokenness and
>> control of others.  Maybe it’s time to play it hard.
>> 
> Bjoern,
> 
> I tend to agree in principle, however I think before playing hardball,
> we should make it easier to be protocol compliant. One of the issues
> that intermediate nodes (as well as end nodes) have with processing
> IPv6 is the open endedness of the protocol mechanisms. By the spec,
> end hosts are supposed to be able to reassemble a single packet
> composed of over 8000 fragments.

No, a node is required to support reassembly up to 1500 octets (the
limit in IPv4 was 576) which works out at 183 minimum sized fragments.
Most nodes support larger than minimum reassembly buffers.

> Before RFC8200, all intermediate
> nodes were expected to process packets that could contain over 700
> individual Hop-by-Hop options. Those simply aren't practical to
> support in an implementation, and as Fernando points out no one is
> going to spend money on fixing that. But, we can set reasonable
> expections of support, such a minimum fragment size or allow a limit
> on number of options in packet (eight is suggested for instance). With
> such limits and improved packet processing tehniques and device
> programmability, I think it's feasible and cost-effective for new
> network devices to increase their protocol compliance.

Again this was people being idiotic. Firstly there was never a requirement
to reassemble packets in routers.  So unless you actually had link packets
that were 2^16-1 bytes in size you would never see such counts on a packet.
Also given that it is impossible to process HBH options in other than the
0 offset fragment (you can’t know if the start of a non 0 offset fragment is
a HBH option) the practical count in a 1500 octet MTU network is considerably
smaller.  In practice any packet can have be fragmented down to 1280 so that
was always the practical limit into which HBH options needed to fit.  Thats
still a lot of HBH options but no hardware needed to handle 700 option.

Mark


> Tom
> 
>> /bz
>> 
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: marka@isc.org