Re: Non-Last Small IPv6 Fragments

Ole Troan <otroan@employees.org> Wed, 16 January 2019 16:09 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B59112D4F0 for <ipv6@ietfa.amsl.com>; Wed, 16 Jan 2019 08:09:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KzGt_bctrrJt for <ipv6@ietfa.amsl.com>; Wed, 16 Jan 2019 08:09:12 -0800 (PST)
Received: from bugle.employees.org (accordion.employees.org [IPv6:2607:7c80:54:3::74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABC0412D4ED for <ipv6@ietf.org>; Wed, 16 Jan 2019 08:09:12 -0800 (PST)
Received: from [192.168.10.191] (30.51-175-112.customer.lyse.net [51.175.112.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bugle.employees.org (Postfix) with ESMTPSA id DF50EFECBE91; Wed, 16 Jan 2019 16:09:10 +0000 (UTC)
Content-Type: multipart/alternative; boundary="Apple-Mail-C9DDB747-DBF4-45E8-8C98-47DBDCC281DB"
Mime-Version: 1.0 (1.0)
Subject: Re: Non-Last Small IPv6 Fragments
From: Ole Troan <otroan@employees.org>
X-Mailer: iPhone Mail (16C101)
In-Reply-To: <CAHw9_i+FB-tb8c+G22FCUxNg9BDpMfwqur8gSn5QaXteBcABZA@mail.gmail.com>
Date: Wed, 16 Jan 2019 17:09:07 +0100
Cc: Fernando Gont <fgont@si6networks.com>, IPv6 List <ipv6@ietf.org>, Bob Hinden <bob.hinden@gmail.com>, ek@loon.co, Fernando Gont <fernando@gont.com.ar>
Content-Transfer-Encoding: 7bit
Message-Id: <9A9B81FA-0052-4EAF-9CC8-CEB8955300BB@employees.org>
References: <CAOSSMjV0Vazum5OKztWhAhJrjLjXc5w5YGxdzHgbzi7YVSk7rg@mail.gmail.com> <CALx6S36V7vrVyoTP0G6+S5XeFNB3KWS5UaNnVi20xogRERdCfg@mail.gmail.com> <973A1649-55F6-4D97-A97F-CEF555A4D397@employees.org> <CALx6S34YbBe8xBod3VsWVO33TpZcdxh2uV1vaO8Z_NKnVXp66g@mail.gmail.com> <A3C3F9C0-0A07-41AF-9671-B9E486CB8246@employees.org> <AEA47E27-C0CB-4ABE-8ADE-51E9D599EF8F@gmail.com> <6aae7888-46a4-342d-1d76-10f8b50cebc4@gmail.com> <EC9CC5FE-5215-4105-8A34-B3F123D574B9@employees.org> <4c56f504-7cd7-6323-b14a-d34050d13f4e@foobar.org> <9E6D4A6E-8ABA-4BAB-BEC5-969078323C96@employees.org> <CAAedzxpdF+yhBXfnwUcaQb-HkgdaqXRU3L+S7v8sS1F0OkwM9A@mail.gmail.com> <78a8a0e0-8808-364c-41f7-f81f90362432@gont.com.ar> <CAAedzxpjxhP0nOZVU0CTwA1u3fsPFthrJASjDEfnLcRNvr2gBQ@mail.gmail.com> <c9be798e-5a32-7c3e-a948-9ca2fab30411@si6networks.com> <CAHw9_i+M2-420pykp99LcgMNSG=eeDqsZK8+hN20t_uUdANHfA@mail.gmail.com> <d6e52c30-bbd1-1ee7-144c-fa13a9df5f38@gmail.com> <0f4a6c88-1def-6766-235b-1bcd2cc5e33b@si6networks.com> <C AHw9_i+FB-tb8c+G22FCUxNg9BDpMfwqur8gSn5QaXteBcABZA@mail.gmail.com>
To: Warren Kumari <warren@kumari.net>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/_GtW6w5WlO5-CkXaF-E_R8loYno>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Jan 2019 16:09:16 -0000


> On 16 Jan 2019, at 16:11, Warren Kumari <warren@kumari.net> wrote:
> 
> 
> 
>> On Wed, Jan 16, 2019 at 2:52 AM Fernando Gont <fgont@si6networks.com> wrote:
>> On 15/1/19 22:02, Brian E Carpenter wrote:
>> > For my comment, search for "Aaargh"
>> 
>> :-) -- I was catching up with email, and read them in sequence. --
>> thanks for the note, I *expected* it :-)
>> 
>> 
>> 
>> >>     > [Silly Idea #2]
>> >>     > Separate, even sillier idea: everyone converges on using 16 bits of
>> >>     > the flow ID to encode the lowest MTU encountered along the path.  Here
>> >>     > again, TCP MSS clamping style behaviour would be applied to this
>> >>
>> >>
>> >> https://media.giphy.com/media/3o6ZthnDqxfAOFIhdC/giphy.gif
>> >> Because there are deployed systems already, I don't think that this can be deployed **and fully relied upon**, but Ido think that it might actually be really useful. If the first 2 bits of the flow label are '11' or '10' or something, then it could mean that the next N (13?) bits of the flow label contain the minimum MTU along the path. 
>> > 
>> > Aaargh. That's a gross violation of the standard for the flow label. Short form: you can't use the flow label for signaling. Long form: RFC6436, RFC6437, plus RFC6294 for a menagerie of other terrible ways to abuse the flow label.
>> 
>> Or, put another way: if we were to use the FL for this, it would screw
>> up the currently-intended use.
> 
> Yup, I had actually read those the above, but it was a while back...
> 
> I'm not really sure it does screw up the intended use -- the FL is 20 bits. If we were to do something like Erik had proposed, and we wanted to be able to signal up to a 9K MTU, we would need 13bits (LN(9K-1280)/LN(2) = 12.9). 
> 20 - 13 gives 7 bits (128) for the hash entropy. "7 bits of entropy, evenly distributed, should be enough for anyone", he said, hoping no-one points at the obvious correlation to 640K of RAM...
> If we only wanted to signal full granularity between 1500 and 1280, and then require that any MTU between 1500 and 9K falls into one of 36 buckets, we could reserve one byte to do so (1500-1280=220. 256-220=36).
> 
> This likely is still a horrible, no good idea, but it does at least make the MTU available to things looking at the L3 header only, and doesn't require routers to have to dig into extension headers. 

A splendid idea indeed. 
Of course you could also take the topmost bit of the payload field and encode the 8 bits required in a vector of packets. I suggest using a magic cookie first. E.g the string “MTU”, rot-13 encoded in morse. This way you should be able to signal the MTU in less than a hundred packets. 

Ole


> 
> Whatever the case, when we finally design IP-NG-NG, let's set aside 512bits (at least) to be "reserved for future abuse" :-P Or, perhaps, every bit should be fully cast in stone (with no room for extensions) so that they don't become attractive nuisances for ugly hacks...
> 
> :-)
> W
>> 
>> 
>> 
>> -- 
>> Fernando Gont
>> SI6 Networks
>> e-mail: fgont@si6networks.com
>> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
>> 
>> 
>> 
>> 
> 
> 
> -- 
> I don't think the execution is relevant when it was obviously a bad idea in the first place.
> This is like putting rabid weasels in your pants, and later expressing regret at having chosen those particular rabid weasels and that pair of pants.
>    ---maf
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------