RE: draft-bonica-6man-frag-deprecate

"Templin, Fred L" <Fred.L.Templin@boeing.com> Mon, 01 July 2013 16:48 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B7FC11E8112 for <ipv6@ietfa.amsl.com>; Mon, 1 Jul 2013 09:48:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.459
X-Spam-Level:
X-Spam-Status: No, score=-6.459 tagged_above=-999 required=5 tests=[AWL=0.140, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DdRPtSlNyUiZ for <ipv6@ietfa.amsl.com>; Mon, 1 Jul 2013 09:48:06 -0700 (PDT)
Received: from blv-mbsout-02.boeing.com (blv-mbsout-02.boeing.com [130.76.32.232]) by ietfa.amsl.com (Postfix) with ESMTP id AC0B311E8143 for <ipv6@ietf.org>; Mon, 1 Jul 2013 09:48:06 -0700 (PDT)
Received: from blv-mbsout-02.boeing.com (localhost.localdomain [127.0.0.1]) by blv-mbsout-02.boeing.com (8.14.4/8.14.4/DOWNSTREAM_MBSOUT) with ESMTP id r61Gm5JZ021317 for <ipv6@ietf.org>; Mon, 1 Jul 2013 09:48:05 -0700
Received: from XCH-NWHT-09.nw.nos.boeing.com (xch-nwht-09.nw.nos.boeing.com [130.247.25.115]) by blv-mbsout-02.boeing.com (8.14.4/8.14.4/UPSTREAM_MBSOUT) with ESMTP id r61Gm3Wr021265 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=OK); Mon, 1 Jul 2013 09:48:04 -0700
Received: from XCH-EXCO-103.nw.nos.boeing.com (130.247.25.37) by XCH-NWHT-09.nw.nos.boeing.com (130.247.25.115) with Microsoft SMTP Server (TLS) id 8.3.297.1; Mon, 1 Jul 2013 09:48:04 -0700
Received: from XCH-BLV-504.nw.nos.boeing.com ([169.254.4.48]) by XCH-EXCO-103.nw.nos.boeing.com ([fe80::7434:66d:a0ba:2234%15]) with mapi id 14.02.0328.011; Mon, 1 Jul 2013 09:48:03 -0700
From: "Templin, Fred L" <Fred.L.Templin@boeing.com>
To: "sthaug@nethelp.no" <sthaug@nethelp.no>
Subject: RE: draft-bonica-6man-frag-deprecate
Thread-Topic: draft-bonica-6man-frag-deprecate
Thread-Index: AQHOdnhxUZaGJnzSMU6ZOUB9nA7EbJlQBFpw
Date: Mon, 01 Jul 2013 16:48:02 +0000
Message-ID: <2134F8430051B64F815C691A62D983180B1AC9@XCH-BLV-504.nw.nos.boeing.com>
References: <2134F8430051B64F815C691A62D983180B0221@XCH-BLV-504.nw.nos.boeing.com> <520FB317-19E8-4DCA-81FB-124B17732FE0@employees.org> <2134F8430051B64F815C691A62D983180B19B9@XCH-BLV-504.nw.nos.boeing.com> <20130701.183132.78726456.sthaug@nethelp.no>
In-Reply-To: <20130701.183132.78726456.sthaug@nethelp.no>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [130.247.104.6]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-TM-AS-MML: disable
Cc: "ipv6@ietf.org" <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Jul 2013 16:48:20 -0000

Hi Steinar,

> -----Original Message-----
> From: sthaug@nethelp.no [mailto:sthaug@nethelp.no]
> Sent: Monday, July 01, 2013 9:32 AM
> To: Templin, Fred L
> Cc: otroan@employees.org; ipv6@ietf.org
> Subject: Re: draft-bonica-6man-frag-deprecate
> 
> > > as far as I can see the setting IPv6 minimum MTU to 1280, which
> gives
> > > ample room for
> > > nested tunnels works as designed.
> >
> > But, what would that look like in real life? The first tunnel
> > (T1) would have to set a 1280 MTU so that its tunneled packets
> > would emerge as 1320 bytes. Then, the next tunnel (T2) would
> > have to set a 1320 MTU so its tunneled packets would emerge as
> > 1360. Then the next tunnel (T3) would have to set a 1360 MTU
> > so that its tunneled packets would emerge as 1400, etc. until
> > we run out of available MTU. The question is, how can those
> > tunnels be so carefully coordinated so that the nesting is
> > nailed down enough so that we will never have an MTU infraction?
> 
> I strongly disagree that we should make provisions for umpteen levels
> of tunneling. In my network, native IPv6 with no tunnels is clearly
> the goal. Anything more than one level of tunneling is a *failure*.

Tunnels within tunnels are a fact of life in real networks today.
Tunnels are used for many things other than transition, including
security, mobility, routing control, etc. and deployment of IPv6
would sustain rather than reverse that trend. Plus, it is not just
about tunnels within tunnels but also native links that configure
a small MTU.

Back to tunnels within tunnels, there are *many* examples that
would prove my point but I will give just one. A mobile node
configures a 1280 MTU tunnel to a "home agent" and keeps the
tunnel alive as it moves around. A second mobile node comes
onto the link provided by the first mobile, and also configures
a 1280 MTU tunnel. The second mobile node emits a 1280 packet
which (when tunneled) becomes 1320. The first mobile node
drops the packet and returns "Packet Too Big". In response,
the second mobile has two choices: 1) fragment, or 2) shut
down the tunnel. 

> I run my IPv6 customer links with MTU 1500.

Good, but I would like to see you push that to 8KB.
 
> > > the vendor I'm most familiar with does not do this in hardware.
> sure,
> > > you can get reassembly, but at an order of one or two magnitudes
> less.
> > > if anyone know of platforms doing IPv6 fragment reassembly at line
> rate
> > > for 10G or 100G interfaces I'll stand corrected. ;-)
> > > for now reassembly in the network is not realistic.
> >
> > Reassembly is required by RFC2460, RFC2473 and I think others
> > have also been mentioned. To support tunnels, and especially
> > tunnels within tunnels, it needs to be there.
> 
> Reassembly is required by end systems, which typically don't run at
> 100G.

Reassembly is also required by any node that configures an
RFC2473 egress tunnel endpoint. 

> If I were to vote with my wallet, reassembly at 100G and similar line
> rates is *way* down on my requirements list.

Two things about this is that 1) the location of the tunnel
egress should be carefully selected, and 2) the SEAL tunnel
egress can use RFC4821-style probing to tune out fragmentation
when the path supports a sufficiently large MTU. SEAL is not
about steady-state, use-all-the-time fragmentation; it is
about doing what needs to be done while being as efficient
as possible.

> Requiring L4 info in the first fragment

SEAL does that.

> (*and* in each subsequent fragment)

SEAL doesn't do that unless some new IPv6 extension header was
defined. Then, SEAL would use the extension header the same as
any other IPv6 protocol.

> is far more important.

Good; let's make it happen.

Thanks - Fred
fred.l.templin@boeing.com
 
> Steinar Haug, AS 2116