Re: Non-Last Small IPv6 Fragments

"Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net> Fri, 11 January 2019 13:43 UTC

Return-Path: <bzeeb-lists@lists.zabbadoz.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4D43124BAA for <ipv6@ietfa.amsl.com>; Fri, 11 Jan 2019 05:43:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I6uIJ8vyzE-3 for <ipv6@ietfa.amsl.com>; Fri, 11 Jan 2019 05:42:59 -0800 (PST)
Received: from mx1.sbone.de (cross.sbone.de [195.201.62.131]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6EE011228B7 for <ipv6@ietf.org>; Fri, 11 Jan 2019 05:42:59 -0800 (PST)
Received: from mail.sbone.de (mail.sbone.de [IPv6:fde9:577b:c1a9:31::2013:587]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.sbone.de (Postfix) with ESMTPS id 2EAE98D4A142; Fri, 11 Jan 2019 13:42:57 +0000 (UTC)
Received: from content-filter.sbone.de (content-filter.sbone.de [IPv6:fde9:577b:c1a9:31::2013:2742]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPS id 30D24D20566; Fri, 11 Jan 2019 13:42:56 +0000 (UTC)
X-Virus-Scanned: amavisd-new at sbone.de
Received: from mail.sbone.de ([IPv6:fde9:577b:c1a9:31::2013:587]) by content-filter.sbone.de (content-filter.sbone.de [fde9:577b:c1a9:31::2013:2742]) (amavisd-new, port 10024) with ESMTP id IsdOiRSw7F1X; Fri, 11 Jan 2019 13:42:54 +0000 (UTC)
Received: from [146.179.202.57] (fresh-ayiya.sbone.de [IPv6:fde9:577b:c1a9:f001::2]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPSA id 892BAD2055F; Fri, 11 Jan 2019 13:42:53 +0000 (UTC)
From: "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net>
To: 神明達哉 <jinmei@wide.ad.jp>
Cc: Timothy Winters <twinters@iol.unh.edu>, IPv6 IPv6 List <ipv6@ietf.org>
Subject: Re: Non-Last Small IPv6 Fragments
Date: Fri, 11 Jan 2019 13:43:03 +0000
X-Mailer: MailMate (2.0BETAr6133)
Message-ID: <A0AE6011-C108-4762-A83C-42F6C0985A33@lists.zabbadoz.net>
In-Reply-To: <CAJE_bqe2MqH4WGZHcNeWiaBvvpYB2TEvMoOUWE523TSq-Bd0=Q@mail.gmail.com>
References: <CAOSSMjV0Vazum5OKztWhAhJrjLjXc5w5YGxdzHgbzi7YVSk7rg@mail.gmail.com> <CAJE_bqe2MqH4WGZHcNeWiaBvvpYB2TEvMoOUWE523TSq-Bd0=Q@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/kmU1vWgIw8mE6U0_osGBsn03B-o>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Jan 2019 13:43:01 -0000

On 10 Jan 2019, at 18:55, 神明達哉 wrote:

> I don't see a reason why an implementation can drop such fragments.
> As you pointed out, the standard protocol doesn't prohibit it.  I
> would even consider it "reasonable" (not just "allowed by the
> standard") if an implementation divides a 1300-octet packet into two
> 650-octet fragments (ignoring common header overhead for brevity)
> instead of 1280 + 20, even if there's currently no implementation that
> actually does that.

Well that won’t work as 650 octets is not a multiple of 8 and hence 
the first fragment would be dropped.  You cannot just do size/2; that 
only works for every nth packet size (n to be determined by the reader 
;-) ).

/bz