Re: [dnsext] Some feedback on draft-andrews-dnsext-udp-fragmentation-00.txt

Mark Andrews <marka@isc.org> Sat, 17 December 2011 00:08 UTC

Return-Path: <dnsext-bounces@ietf.org>
X-Original-To: namedroppers-archive-gleetwall6@lists.ietf.org
Delivered-To: ietfarch-namedroppers-archive-gleetwall6@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CBFD721F8538; Fri, 16 Dec 2011 16:08:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1324080523; bh=gWgJ82RDr0D4YcQLC3EJhF/XiILtuPolTa9UpRuRmcI=; h=To:From:References:In-reply-to:Date:Message-Id:Cc:Subject:List-Id: List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe: MIME-Version:Content-Type:Content-Transfer-Encoding:Sender; b=kIJHouhA7jsqoMIuU6M76ilWH/Im/BbbuuOOG+vdJ/mXDc2tj+D2kYjyzoQiQG6eQ Ri+MEWCAdsNIeRyi65YTgS2zNN3vG3fzWIz/pOtMhUv0Mg5zkJIIDbcrjBF0WyeNDz t30wqgY5xU92ej5OSr4SXjzmQGgtpEPNF5VfQO5Q=
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 43C1121F853A for <dnsext@ietfa.amsl.com>; Fri, 16 Dec 2011 16:08:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AQXMHYVIJFUf for <dnsext@ietfa.amsl.com>; Fri, 16 Dec 2011 16:08:41 -0800 (PST)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id 88A4E21F851F for <dnsext@ietf.org>; Fri, 16 Dec 2011 16:08:41 -0800 (PST)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id D50F75F98B1; Sat, 17 Dec 2011 00:08:19 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:4f4:b290:88dd:9a95]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 20C12216C6A; Sat, 17 Dec 2011 00:08:18 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 03D8E1A1A6A7; Sat, 17 Dec 2011 11:08:15 +1100 (EST)
To: Fernando Gont <fernando@gont.com.ar>
From: Mark Andrews <marka@isc.org>
References: <4EEB70EC.50702@gont.com.ar>
In-reply-to: Your message of "Fri, 16 Dec 2011 13:25:16 -0300." <4EEB70EC.50702@gont.com.ar>
Date: Sat, 17 Dec 2011 11:08:15 +1100
Message-Id: <20111217000816.03D8E1A1A6A7@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Some feedback on draft-andrews-dnsext-udp-fragmentation-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: dnsext-bounces@ietf.org
Errors-To: dnsext-bounces@ietf.org

In message <4EEB70EC.50702@gont.com.ar>ar>, Fernando Gont writes:
> Mark,
> 
> Here's some feedback about the aforementioned I-D.

Thanks.
 
> Section 3:
> >    It should be noted that even with IPV6_USE_MIN_MTU set to one that a
> >    PTB message may still be received [RFC 2460] which requires a IPv6 to
> >    add a Fragmentation header to subsequent packets.  There is currently
> >    no way to avoid this, without using raw sockets, as there is no way
> >    for a application to request that a Fragmentation header be added to
> >    a packet.
> 
> I understand that this could (at leasst in theory) happen but, out of
> curiosity: are there any devices that leverage the aforementioned
> featuer specified in RFC 2460? NAT 64? Othes?

Its been told to me that there are small (<1280) MTU networks that
don't fragment and reassembly IPv6 at the link layer.  I have no
reason to disbelieve this.  Instead they depend on this.  I have no
direct knowledge.

I do have direct knowledge of DNS/UDP responses being fragmented
at ethernet MTU (by looking at final fragment offsets) rather than
1280 and only the last fragment making it through as a result of a
6in4 link in the path even with repeated queries to the authoritative
server.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org
_______________________________________________
dnsext mailing list
dnsext@ietf.org
https://www.ietf.org/mailman/listinfo/dnsext