Re: Transmission of IPv6 Jumbograms as Atomic Fragments

Mark Smith <markzzzsmith@gmail.com> Fri, 19 November 2021 15:53 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 349CA3A0798 for <ipv6@ietfa.amsl.com>; Fri, 19 Nov 2021 07:53:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.037
X-Spam-Level:
X-Spam-Status: No, score=-1.037 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=0.559, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e15030qMJ8X5 for <ipv6@ietfa.amsl.com>; Fri, 19 Nov 2021 07:53:06 -0800 (PST)
Received: from mail-io1-xd2d.google.com (mail-io1-xd2d.google.com [IPv6:2607:f8b0:4864:20::d2d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE6D53A07A6 for <ipv6@ietf.org>; Fri, 19 Nov 2021 07:52:59 -0800 (PST)
Received: by mail-io1-xd2d.google.com with SMTP id z18so13312277iof.5 for <ipv6@ietf.org>; Fri, 19 Nov 2021 07:52:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=n+c/LvoO0K3HnE9WBwiu+NUrT9+6X68fHlGx3vLEsvg=; b=evgnoV3huEBfSP5dlMBAcQ9FR1lm3+7wnz7VZWwUgIEqEYDaYii39moVLzr0Lrc3hg ZzYwCnW+18By68aW7JPTX6sSpzsrSaa3v4YZ8CZovL3JIP47E8ONP09ypwyIxpFt6j45 WO60gYoZNRliFQGjR/QvLYgU6v+cUneDm/32GA0X5G/b03Q5k1N0PgeKCWnVyUX13xWB iKSSMb+Jea5tU7r/WDXh45M+t8izM4d20HEP5ota2iVWKzULVTPFuIeY1J3BbaAE9xvI Vo6L0bhD4Ez/qN7tnlRIVxxyYESOjokhoraH8X8bPGM3I/pLt9O5USPQAsVrBlL1oK+D 61vg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=n+c/LvoO0K3HnE9WBwiu+NUrT9+6X68fHlGx3vLEsvg=; b=TpiL+P/leJFOMK0yQhlT8XbMzvZIFw/92iz9uZGzt7o8yFfccDlhCndWs5ae7WrvQI ORqo7yMDLZVrmtgM4NbiQPwqyLGwd1NhAlkFh5rceMcryew5QX3oUQtIjmryJd8f4Ztk y6lXeY8DqJMwMldoHhBAcR0HhDDCKUZ3uFhY6SEySrpGVUnWV25EuB8aMjMNUXB3qcVT w2rlsbo2j/zs5VRkUN0U+voiGYFhJhKy++YykaUkl27iWdlUXK9B1K6Qgh48FXEu2HEy P1nN9DLe06iGV6FXd7Epz4iVyLrfi0fUQ53YCzk/cVLnDM7/kxjh5fh1yZ416RA06vsO n9PQ==
X-Gm-Message-State: AOAM5313nKWbNzGZZViJYRFf/P80N9Hq4i8x20Sqa3/C3XOSyd+1eZNs eJs95XKwWyH8/k0b3hVdfcNdMLhST/CgV6WTDVxAIJPj
X-Google-Smtp-Source: ABdhPJwzVltMl7i2g9sHFBcRqvGuzpdr5s2GjMPmZV1ZhLGP0eoxOPXl7cbl+LxUyAz3g0IYxyEgsb1plBZj5QVj1/I=
X-Received: by 2002:a02:6901:: with SMTP id e1mr28052553jac.0.1637337178412; Fri, 19 Nov 2021 07:52:58 -0800 (PST)
MIME-Version: 1.0
References: <01510cc3c19b4b4b8cef41357c975fd9@boeing.com>
In-Reply-To: <01510cc3c19b4b4b8cef41357c975fd9@boeing.com>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Sat, 20 Nov 2021 02:52:46 +1100
Message-ID: <CAO42Z2zitj2mOzj80G_SUfukg551A64n9HnOcC2-ukCta4Ohaw@mail.gmail.com>
Subject: Re: Transmission of IPv6 Jumbograms as Atomic Fragments
To: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>
Cc: Nick Hilliard <nick@foobar.org>, IPv6 List <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e59c6505d1264426"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/YdoRLoxkYVCSXaP2REMLOXqQaPs>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Nov 2021 15:53:10 -0000

On Sat, 20 Nov 2021, 02:32 Templin (US), Fred L, <Fred.L.Templin@boeing.com>
wrote:

> Thanks Mark, but I don’t want AH; I want AERO/OMNI. I want the
> Identifications to serve
>
> the dual purpose of supporting the fragmentation/reassembly process and
> providing an
>
> in-window value that recipients can use to detect spurious packets. And, I
> want the same
>
> mechanism used for packets of all sizes, up to and including jumbos.
>

AH + JG

Done. No reinventing wheels.


>
> Fred
>
>
>
> *From:* Mark Smith [mailto:markzzzsmith@gmail.com]
> *Sent:* Thursday, November 18, 2021 4:11 PM
> *To:* Templin (US), Fred L <Fred.L.Templin@boeing.com>
> *Cc:* Nick Hilliard <nick@foobar.org>; IPv6 List <ipv6@ietf.org>
> *Subject:* Re: Transmission of IPv6 Jumbograms as Atomic Fragments
>
>
>
> On Fri, 19 Nov 2021, 07:12 Templin (US), Fred L, <
> Fred.L.Templin@boeing.com> wrote:
>
> Nick,
>
> > Do you have a use case in mind for the ID field?
>
> Thank you for this timely question. I just got done posting a major update
> to the
> draft, which now is titled: "IPv6 Packet Identification" and considers all
> forms of
> IPv6 packets and not just Jumbograms. In answer to your question here is
> the new
> Section 2 text from the draft (link provided below):
>
> "2.  IPv6 Packet Identification
>
>    When IPv6 sources and destinations have some way of maintaining
>    "windows" of acceptable Identification values, the destination may be
>    able to examine received packet Identifications to determine whether
>    they likely originated from the source.
>
>
>
> This seems to be describing the sequence number verification used in IPsec
> AH per RFC 4302.
>
>
>
> It may be worth either just using AH as is, and getting all of its other
> benefits, or look at creating a simplified version of it rather than
> modifying the jumbogram EH to start duplicating existing AH functionality.
>
>
>
> According to RFC 4302 there are a range of reserved SPI values (1 through
> 255), you could use one of those to indicate a light weight version of AH
> that just does packet identification, avoiding the need to set up Security
> Associations with IKE.
>
>
>
> Regards,
>
> Mark.
>
>
>
> The AERO
>    [I-D.templin-6man-aero] and OMNI [I-D.templin-6man-omni]
>    specifications discuss methods for maintaining windows of
>    unpredictable values that may reduce attack profiles in some
>    environments."
>
> Thanks, and here is the draft URL:
>
> https://datatracker.ietf.org/doc/draft-templin-6man-jumbofrag/
>
> Fred
>
> > -----Original Message-----
> > From: Nick Hilliard [mailto:nick@foobar.org]
> > Sent: Thursday, November 18, 2021 9:16 AM
> > To: Templin (US), Fred L <Fred.L.Templin@boeing.com>
> > Cc: IPv6 List <ipv6@ietf.org>
> > Subject: Re: Transmission of IPv6 Jumbograms as Atomic Fragments
> >
> >
> > Templin (US), Fred L wrote on 18/11/2021 15:23:
> > > Bob, what I want is exactly the Identification field that is found in
> the Fragment Header
> > > while simply leaving the rest of the fields of that header set to 0
> >
> > Do you have a use case in mind for the ID field?
> >
> > Nick
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
>