Re: draft-van-beijnum-multi-mtu-05.txt

David Lamparter <equinox@diac24.net> Thu, 14 April 2016 12:48 UTC

Return-Path: <equinox@diac24.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AD1B12DFBF for <ipv6@ietfa.amsl.com>; Thu, 14 Apr 2016 05:48:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yNofU3I-JEAJ for <ipv6@ietfa.amsl.com>; Thu, 14 Apr 2016 05:48:15 -0700 (PDT)
Received: from eidolon.nox.tf (eidolon.nox.tf [IPv6:2a02:238:f02a:8e2f:1::]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 410D812DF32 for <ipv6@ietf.org>; Thu, 14 Apr 2016 05:48:15 -0700 (PDT)
Received: from equinox by eidolon.nox.tf with local (Exim 4.86_2) (envelope-from <equinox@diac24.net>) id 1aqggp-003log-UQ; Thu, 14 Apr 2016 14:48:09 +0200
Date: Thu, 14 Apr 2016 14:48:07 +0200
From: David Lamparter <equinox@diac24.net>
To: otroan@employees.org
Subject: Re: draft-van-beijnum-multi-mtu-05.txt
Message-ID: <20160414124807.GP518778@eidolon>
References: <20160406151831.GZ518778@eidolon> <570569C2.4030601@acm.org> <20160406212048.GB518778@eidolon> <20160406220411.GC518778@eidolon> <E27329D1-400E-4470-8277-64A664508854@employees.org> <20160414122245.GN518778@eidolon> <07555AE0-8B99-464D-8F22-1663BF6579A7@employees.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <07555AE0-8B99-464D-8F22-1663BF6579A7@employees.org>
User-Agent: Mutt/1.5.24 (2015-08-30)
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipv6/nX5jUeaAoGltMtaAieRU3NE65Rw>
Cc: Erik Nordmark <nordmark@acm.org>, Iljitsch van Beijnum <iljitsch@muada.com>, 6man WG <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 12:48:16 -0000

On Thu, Apr 14, 2016 at 02:30:49PM +0200, otroan@employees.org wrote:
> David,
> 
> >> In general I'd prefer that we reuse existing mechanisms for path mtu
> >> discovery, and not invent new ones purely for the case of two directly
> >> connected neighbors.
> > 
> > That's actually the crux of it: this isn't Path MTU discovery.  The MTU
> > discovered by this mechanism is the first-hop MTU for a lot of paths in
> > case of a router and it's going to be distinct from the final PMTU
> > towards a particular destination.  Plus, state on this only ever exists
> > for direct neighbors, not for any random internet host.
> 
> why couldn't it be done as end-to-end MTU?
> 
> the directly connected mechanism would be just to give a hint that
> there might be nodes here capable of a higher MTU. then do normal MTU
> probing / detection.
> 
> what would be gain be to have a specific protocol to probe directly
> connected neighbors?

It can:
- work (pro-)actively and independent of higher-layer protocols,
  establishing MTU once
- contain the different logic to understand that the router's MTU is the
  upper cap for all destinations behind that router
- contain the different probing parameters (being more aggressive) that
  are appropriate for a local network
- optionally carry extra information to reuse probing results across
  different addresses that a host has on a segment

I suppose this can be achieved by using a specialized version of 4821 on
the link... something like this:

- host does NS as usual, or catches unsolicited NA
- NA contains new "MTU discovery" option with contents:
  - indication of capability of first-hop MTU discovery
  - known maximum MRU of NA's sender (i.e. upper limit)
  - link-local address(?) + TCP port number(?) for PLMTUD probing
- host establishes one or more TCP sessions to that port with the
  express and only purpose of probing MTU
  (may as well do it on an existing TCP session if one exists)
- PLMTUD switches into some "first-hop" special mode (lower timers,
  parallel operation, different values) to establish and store the value
  with proper semantics (router case)

Is that what you have in mind?


-David