Re: [dnsext] Some feedback on draft-andrews-dnsext-udp-fragmentation-00.txt
Mark Andrews <marka@isc.org> Sat, 17 December 2011 00:08 UTC
Return-Path: <dnsext-bounces@ietf.org>
X-Original-To: namedroppers-archive-gleetwall6@lists.ietf.org
Delivered-To: ietfarch-namedroppers-archive-gleetwall6@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com
(Postfix) with ESMTP id CBFD721F8538; Fri, 16 Dec 2011 16:08:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1;
t=1324080523; bh=gWgJ82RDr0D4YcQLC3EJhF/XiILtuPolTa9UpRuRmcI=;
h=To:From:References:In-reply-to:Date:Message-Id:Cc:Subject:List-Id: List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe:
MIME-Version:Content-Type:Content-Transfer-Encoding:Sender;
b=kIJHouhA7jsqoMIuU6M76ilWH/Im/BbbuuOOG+vdJ/mXDc2tj+D2kYjyzoQiQG6eQ
Ri+MEWCAdsNIeRyi65YTgS2zNN3vG3fzWIz/pOtMhUv0Mg5zkJIIDbcrjBF0WyeNDz
t30wqgY5xU92ej5OSr4SXjzmQGgtpEPNF5VfQO5Q=
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix)
with ESMTP id 43C1121F853A for <dnsext@ietfa.amsl.com>;
Fri, 16 Dec 2011 16:08:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5
tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AQXMHYVIJFUf for
<dnsext@ietfa.amsl.com>; Fri, 16 Dec 2011 16:08:41 -0800 (PST)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by
ietfa.amsl.com (Postfix) with ESMTP id 88A4E21F851F for <dnsext@ietf.org>;
Fri, 16 Dec 2011 16:08:41 -0800 (PST)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19])
(using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN
"bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org
(Postfix) with ESMTPS id D50F75F98B1;
Sat, 17 Dec 2011 00:08:19 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown
[IPv6:2001:470:1f00:820:4f4:b290:88dd:9a95]) (using TLSv1 with cipher
DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by
bikeshed.isc.org (Postfix) with ESMTPSA id 20C12216C6A;
Sat, 17 Dec 2011 00:08:18 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org
(Postfix) with ESMTP id 03D8E1A1A6A7; Sat, 17 Dec 2011 11:08:15 +1100 (EST)
To: Fernando Gont <fernando@gont.com.ar>
From: Mark Andrews <marka@isc.org>
References: <4EEB70EC.50702@gont.com.ar>
In-reply-to: Your message of "Fri,
16 Dec 2011 13:25:16 -0300." <4EEB70EC.50702@gont.com.ar>
Date: Sat, 17 Dec 2011 11:08:15 +1100
Message-Id: <20111217000816.03D8E1A1A6A7@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Some feedback on
draft-andrews-dnsext-udp-fragmentation-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>,
<mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>,
<mailto:dnsext-request@ietf.org?subject=subscribe>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: dnsext-bounces@ietf.org
Errors-To: dnsext-bounces@ietf.org
In message <4EEB70EC.50702@gont.com.ar>ar>, Fernando Gont writes: > Mark, > > Here's some feedback about the aforementioned I-D. Thanks. > Section 3: > > It should be noted that even with IPV6_USE_MIN_MTU set to one that a > > PTB message may still be received [RFC 2460] which requires a IPv6 to > > add a Fragmentation header to subsequent packets. There is currently > > no way to avoid this, without using raw sockets, as there is no way > > for a application to request that a Fragmentation header be added to > > a packet. > > I understand that this could (at leasst in theory) happen but, out of > curiosity: are there any devices that leverage the aforementioned > featuer specified in RFC 2460? NAT 64? Othes? Its been told to me that there are small (<1280) MTU networks that don't fragment and reassembly IPv6 at the link layer. I have no reason to disbelieve this. Instead they depend on this. I have no direct knowledge. I do have direct knowledge of DNS/UDP responses being fragmented at ethernet MTU (by looking at final fragment offsets) rather than 1280 and only the last fragment making it through as a result of a 6in4 link in the path even with repeated queries to the authoritative server. Mark -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: marka@isc.org _______________________________________________ dnsext mailing list dnsext@ietf.org https://www.ietf.org/mailman/listinfo/dnsext
- [dnsext] Some feedback on draft-andrews-dnsext-ud… Fernando Gont
- Re: [dnsext] Some feedback on draft-andrews-dnsex… Mark Andrews