Re: Transmission of IPv6 Jumbograms as Atomic Fragments
Mark Smith <markzzzsmith@gmail.com> Fri, 19 November 2021 15:53 UTC
Return-Path: <markzzzsmith@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 349CA3A0798 for <ipv6@ietfa.amsl.com>; Fri, 19 Nov 2021 07:53:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.037
X-Spam-Level:
X-Spam-Status: No, score=-1.037 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=0.559, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e15030qMJ8X5 for <ipv6@ietfa.amsl.com>; Fri, 19 Nov 2021 07:53:06 -0800 (PST)
Received: from mail-io1-xd2d.google.com (mail-io1-xd2d.google.com [IPv6:2607:f8b0:4864:20::d2d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE6D53A07A6 for <ipv6@ietf.org>; Fri, 19 Nov 2021 07:52:59 -0800 (PST)
Received: by mail-io1-xd2d.google.com with SMTP id z18so13312277iof.5 for <ipv6@ietf.org>; Fri, 19 Nov 2021 07:52:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=n+c/LvoO0K3HnE9WBwiu+NUrT9+6X68fHlGx3vLEsvg=; b=evgnoV3huEBfSP5dlMBAcQ9FR1lm3+7wnz7VZWwUgIEqEYDaYii39moVLzr0Lrc3hg ZzYwCnW+18By68aW7JPTX6sSpzsrSaa3v4YZ8CZovL3JIP47E8ONP09ypwyIxpFt6j45 WO60gYoZNRliFQGjR/QvLYgU6v+cUneDm/32GA0X5G/b03Q5k1N0PgeKCWnVyUX13xWB iKSSMb+Jea5tU7r/WDXh45M+t8izM4d20HEP5ota2iVWKzULVTPFuIeY1J3BbaAE9xvI Vo6L0bhD4Ez/qN7tnlRIVxxyYESOjokhoraH8X8bPGM3I/pLt9O5USPQAsVrBlL1oK+D 61vg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=n+c/LvoO0K3HnE9WBwiu+NUrT9+6X68fHlGx3vLEsvg=; b=TpiL+P/leJFOMK0yQhlT8XbMzvZIFw/92iz9uZGzt7o8yFfccDlhCndWs5ae7WrvQI ORqo7yMDLZVrmtgM4NbiQPwqyLGwd1NhAlkFh5rceMcryew5QX3oUQtIjmryJd8f4Ztk y6lXeY8DqJMwMldoHhBAcR0HhDDCKUZ3uFhY6SEySrpGVUnWV25EuB8aMjMNUXB3qcVT w2rlsbo2j/zs5VRkUN0U+voiGYFhJhKy++YykaUkl27iWdlUXK9B1K6Qgh48FXEu2HEy P1nN9DLe06iGV6FXd7Epz4iVyLrfi0fUQ53YCzk/cVLnDM7/kxjh5fh1yZ416RA06vsO n9PQ==
X-Gm-Message-State: AOAM5313nKWbNzGZZViJYRFf/P80N9Hq4i8x20Sqa3/C3XOSyd+1eZNs eJs95XKwWyH8/k0b3hVdfcNdMLhST/CgV6WTDVxAIJPj
X-Google-Smtp-Source: ABdhPJwzVltMl7i2g9sHFBcRqvGuzpdr5s2GjMPmZV1ZhLGP0eoxOPXl7cbl+LxUyAz3g0IYxyEgsb1plBZj5QVj1/I=
X-Received: by 2002:a02:6901:: with SMTP id e1mr28052553jac.0.1637337178412; Fri, 19 Nov 2021 07:52:58 -0800 (PST)
MIME-Version: 1.0
References: <01510cc3c19b4b4b8cef41357c975fd9@boeing.com>
In-Reply-To: <01510cc3c19b4b4b8cef41357c975fd9@boeing.com>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Sat, 20 Nov 2021 02:52:46 +1100
Message-ID: <CAO42Z2zitj2mOzj80G_SUfukg551A64n9HnOcC2-ukCta4Ohaw@mail.gmail.com>
Subject: Re: Transmission of IPv6 Jumbograms as Atomic Fragments
To: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>
Cc: Nick Hilliard <nick@foobar.org>, IPv6 List <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e59c6505d1264426"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/YdoRLoxkYVCSXaP2REMLOXqQaPs>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Nov 2021 15:53:10 -0000
On Sat, 20 Nov 2021, 02:32 Templin (US), Fred L, <Fred.L.Templin@boeing.com> wrote: > Thanks Mark, but I don’t want AH; I want AERO/OMNI. I want the > Identifications to serve > > the dual purpose of supporting the fragmentation/reassembly process and > providing an > > in-window value that recipients can use to detect spurious packets. And, I > want the same > > mechanism used for packets of all sizes, up to and including jumbos. > AH + JG Done. No reinventing wheels. > > Fred > > > > *From:* Mark Smith [mailto:markzzzsmith@gmail.com] > *Sent:* Thursday, November 18, 2021 4:11 PM > *To:* Templin (US), Fred L <Fred.L.Templin@boeing.com> > *Cc:* Nick Hilliard <nick@foobar.org>; IPv6 List <ipv6@ietf.org> > *Subject:* Re: Transmission of IPv6 Jumbograms as Atomic Fragments > > > > On Fri, 19 Nov 2021, 07:12 Templin (US), Fred L, < > Fred.L.Templin@boeing.com> wrote: > > Nick, > > > Do you have a use case in mind for the ID field? > > Thank you for this timely question. I just got done posting a major update > to the > draft, which now is titled: "IPv6 Packet Identification" and considers all > forms of > IPv6 packets and not just Jumbograms. In answer to your question here is > the new > Section 2 text from the draft (link provided below): > > "2. IPv6 Packet Identification > > When IPv6 sources and destinations have some way of maintaining > "windows" of acceptable Identification values, the destination may be > able to examine received packet Identifications to determine whether > they likely originated from the source. > > > > This seems to be describing the sequence number verification used in IPsec > AH per RFC 4302. > > > > It may be worth either just using AH as is, and getting all of its other > benefits, or look at creating a simplified version of it rather than > modifying the jumbogram EH to start duplicating existing AH functionality. > > > > According to RFC 4302 there are a range of reserved SPI values (1 through > 255), you could use one of those to indicate a light weight version of AH > that just does packet identification, avoiding the need to set up Security > Associations with IKE. > > > > Regards, > > Mark. > > > > The AERO > [I-D.templin-6man-aero] and OMNI [I-D.templin-6man-omni] > specifications discuss methods for maintaining windows of > unpredictable values that may reduce attack profiles in some > environments." > > Thanks, and here is the draft URL: > > https://datatracker.ietf.org/doc/draft-templin-6man-jumbofrag/ > > Fred > > > -----Original Message----- > > From: Nick Hilliard [mailto:nick@foobar.org] > > Sent: Thursday, November 18, 2021 9:16 AM > > To: Templin (US), Fred L <Fred.L.Templin@boeing.com> > > Cc: IPv6 List <ipv6@ietf.org> > > Subject: Re: Transmission of IPv6 Jumbograms as Atomic Fragments > > > > > > Templin (US), Fred L wrote on 18/11/2021 15:23: > > > Bob, what I want is exactly the Identification field that is found in > the Fragment Header > > > while simply leaving the rest of the fields of that header set to 0 > > > > Do you have a use case in mind for the ID field? > > > > Nick > > -------------------------------------------------------------------- > IETF IPv6 working group mailing list > ipv6@ietf.org > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 > -------------------------------------------------------------------- > >
- Transmission of IPv6 Jumbograms as Atomic Fragmen… Templin (US), Fred L
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Brian E Carpenter
- RE: [EXTERNAL] Re: Transmission of IPv6 Jumbogram… Templin (US), Fred L
- Re: [EXTERNAL] Re: Transmission of IPv6 Jumbogram… David Farmer
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Templin (US), Fred L
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Michael Richardson
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Bob Hinden
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Justin Iurman
- RE: Transmission of IPv6 Jumbograms as Atomic Fra… Templin (US), Fred L
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Bob Hinden
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Justin Iurman
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Philip Homburg
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Nick Hilliard
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Templin (US), Fred L
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Mark Smith
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Brian E Carpenter
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Justin Iurman
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Templin (US), Fred L
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Tom Herbert
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Mark Smith
- RE: [EXTERNAL] Re: Transmission of IPv6 Jumbogram… Templin (US), Fred L
- Re: [EXTERNAL] Re: Transmission of IPv6 Jumbogram… David Farmer
- RE: [EXTERNAL] Re: Transmission of IPv6 Jumbogram… Templin (US), Fred L
- Re: [EXTERNAL] Re: Transmission of IPv6 Jumbogram… Mark Smith
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Carsten Bormann
- RE: [EXTERNAL] Re: Transmission of IPv6 Jumbogram… Templin (US), Fred L
- Re: [EXTERNAL] Re: Transmission of IPv6 Jumbogram… Nick Hilliard
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Brian E Carpenter
- Re: Transmission of IPv6 Jumbograms as Atomic Fra… Templin (US), Fred L
- RE: Transmission of IPv6 Jumbograms as Atomic Fra… Templin (US), Fred L