Re: [internet-drafts@ietf.org: New Version Notification for draft-jones-6man-historic-rfc2675-00.txt]

Ole Troan <otroan@employees.org> Thu, 09 May 2019 07:56 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1A3F12008C for <ipv6@ietfa.amsl.com>; Thu, 9 May 2019 00:56:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nLSG7BHgrWIC for <ipv6@ietfa.amsl.com>; Thu, 9 May 2019 00:56:30 -0700 (PDT)
Received: from bugle.employees.org (accordion.employees.org [IPv6:2607:7c80:54:3::74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C00B120052 for <ipv6@ietf.org>; Thu, 9 May 2019 00:56:30 -0700 (PDT)
Received: from astfgl.hanazo.no (77.16.65.252.tmi.telenormobil.no [77.16.65.252]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bugle.employees.org (Postfix) with ESMTPSA id EB318FECBF4E; Thu, 9 May 2019 07:56:28 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by astfgl.hanazo.no (Postfix) with ESMTP id 061D514F03D1; Thu, 9 May 2019 09:56:22 +0200 (CEST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.8\))
Subject: Re: [internet-drafts@ietf.org: New Version Notification for draft-jones-6man-historic-rfc2675-00.txt]
From: Ole Troan <otroan@employees.org>
In-Reply-To: <20190509063602.GB39281@profitmargin>
Date: Thu, 09 May 2019 09:56:21 +0200
Cc: Loganaden Velvindron <loganaden@gmail.com>, 6man WG <ipv6@ietf.org>, 神明達哉 <jinmei@wide.ad.jp>
Content-Transfer-Encoding: quoted-printable
Message-Id: <4B00C98D-BCA9-40D8-A8EA-A766EF4CE940@employees.org>
References: <20190508125743.GA19360@tom-desk.erg.abdn.ac.uk> <19A018DE-280E-4400-95AC-7A3697ABE4B8@employees.org> <CAJE_bqd8PP0j63gr9yqW1+7TpZZsQMeviFHGEB1ZTXFgMLbh0g@mail.gmail.com> <CAOp4FwReRs2krw0GUU8hMBxbvWh6rdv62FD=Z0Se0kFZs1jZ9w@mail.gmail.com> <20190509063602.GB39281@profitmargin>
To: Tom Jones <tj@enoti.me>
X-Mailer: Apple Mail (2.3445.104.8)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/syo88Vfi3DQNz-syXRetX96RRwY>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 May 2019 07:56:33 -0000

>>> At Wed, 8 May 2019 18:07:51 +0200,
>>> Ole Troan <otroan@employees.org> wrote:
>>> 
>>>>> We have put this together to change the status of RFC2675 to Historic
>>>>> and would like to request discussion in the working group.
>>>> 
>>>> IPv6 jumbograms was intended for some super computer inter connect with a massive MTU.
>>>> I don't know of any use of it, but is it harmful if the specification is left there in place?
>>>> 
>>>> I don't expect any implementation supporting it unless they also support data-link layers with an MTU > 64K.
>>> 
>>> FWIW, (most if not all) BSD variants have been supporting jumbograms
>>> for many years (admittedly I don't know if it's still working as
>> 
>> Indeed, according to this
>> https://www.freebsd.org/doc/en/books/developers-handbook/ipv6.html#ipv6-jumbo
>> 
>> You need to re-compile the kernel to get support for it. So it's not
>> shipped by default.
>> 
>> I think that it's worth mentioning it that in the draft.
>> 
> 
> Ah, I will raise my hand and admit I hadn't seen large MTU support in
> FreeBSDs loopback interface.
> 
> I have a diff for FreeBSD that removes Jumbogram support:
> https://reviews.freebsd.org/D19960
> 
> As far as I can tell Jumbogram support is always built into the kernel,
> interface support is probably not. 
> 
> I think more telling is the text at the bottom of that section:
> 
> 	"TCP/UDP over jumbogram is not supported at this moment. This is because
> 	we have no medium (other than loopback) to test this. Contact us if you
> 	need this.
> 
> 	IPsec does not work on jumbograms. This is due to some specification
> 	twists in supporting AH with jumbograms (AH header size influences
> 	payload length, and this makes it real hard to authenticate inbound
> 	packet with jumbo payload option as well as AH).
> 
> 	There are fundamental issues in *BSD support for jumbograms. We would
> 	like to address those, but we need more time to finalize these. To name
> 	a few:
> 
> 	mbuf pkthdr.len field is typed as "int" in 4.4BSD, so it will not hold
> 	jumbogram with len > 2G on 32bit architecture CPUs. If we would like to
> 	support jumbogram properly, the field must be expanded to hold 4G + IPv6
> 	header + link-layer header. Therefore, it must be expanded to at least
> 	int64_t (u_int32_t is NOT enough).
> 
> 	We mistakingly use "int" to hold packet length in many places. We need
> 	to convert them into larger integral type. It needs a great care, as we
> 	may experience overflow during packet length computation.
> 
> 	We mistakingly check for ip6_plen field of IPv6 header for packet
> 	payload length in various places. We should be checking mbuf pkthdr.len
> 	instead. ip6_input() will perform sanity check on jumbo payload option
> 	on input, and we can safely use mbuf pkthdr.len afterwards.
> 
> 	TCP code needs a careful update in bunch of places, of course."
> 
> I am not sure how accurate these comments still are. It is not a great
> story for Jumbogram support. If we cannot do TCP, UDP or IPSEC there is
> a lot of work to do to make support more than a tick in a box.

I don't think these are conflicting goals.
You can remove Jumbo support from implementations, while still leaving RFC2675 as is.

If and when Jumbos see usage, your guess is as good as mine if those implementations would need the transport layers as we know them, and certainly if they would reuse the implementations in common OSs.

Best regards,
Ole