Re: [Softwires] Checksum neutrality and L4-protocol independence
Rémi Després <despres.remi@laposte.net> Thu, 16 February 2012 09:54 UTC
Return-Path: <despres.remi@laposte.net>
X-Original-To: softwires@ietfa.amsl.com
Delivered-To: softwires@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 458F121F85BD for <softwires@ietfa.amsl.com>; Thu, 16 Feb 2012 01:54:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.869
X-Spam-Level:
X-Spam-Status: No, score=-0.869 tagged_above=-999 required=5 tests=[AWL=-0.871, BAYES_00=-2.599, HTML_MESSAGE=0.001, MANGLED_SHOP=2.3, MIME_8BIT_HEADER=0.3]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iHeyv6Kl4nrE for <softwires@ietfa.amsl.com>; Thu, 16 Feb 2012 01:54:50 -0800 (PST)
Received: from smtpout.laposte.net (smtpout3.laposte.net [193.253.67.228]) by ietfa.amsl.com (Postfix) with ESMTP id 2C6A221F85C5 for <softwires@ietf.org>; Thu, 16 Feb 2012 01:54:48 -0800 (PST)
Received: from [192.168.0.21] ([88.166.221.144]) by mwinf8506-out with ME id aZul1i00537Y3f403ZulzM; Thu, 16 Feb 2012 10:54:47 +0100
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary="Apple-Mail-17-1039050800"
From: Rémi Després <despres.remi@laposte.net>
In-Reply-To: <CAFUBMqWavEbHKmmUWSWuOZdMm_rHYn0cx3-ZyFUts-R=SRrjvw@mail.gmail.com>
Date: Thu, 16 Feb 2012 10:54:45 +0100
Message-Id: <E61D474E-7988-44AC-AAE0-3F8D2C1A4FC8@laposte.net>
References: <B140D6B2-1B19-43D7-9B63-6BEA83CEB164@juniper.net> <3AAD65F3-5169-49B7-9698-E820EF419B35@employees.org> <53ACB4FC-988F-443C-A936-1CA5B13180EB@free.fr> <C694D7DC-2F98-434F-8123-751E2C1A98D0@employees.org> <081C7074-F5E2-46B7-B2C8-E033F3E5BC15@laposte.net> <B94D39A0-CA66-4AE6-BDC5-E4DFA2D47BEC@employees.org> <A8A6FDA2-0FFC-44D2-BEDF-29FB012D3113@laposte.net> <4749FAFA-A522-4795-9B8A-9AA4B030E075@employees.org> <C38B2AD1-08F1-4ECD-8ADB-AE88BC34A0B9@laposte.net> <CAFUBMqW+RrHKYJbgLBSbm3RebQWcr6oMZRcCwbv3_QR13MLV1Q@mail.gmail.com> <9FD6B92C-9B42-4A30-9FF5-30A86F845E72@laposte.net> <CAFUBMqVygJv4k_zHsyccL-W3x_=tcaWe61_BoHheyN6p-FH5rA@mail.gmail.com> <8D2093C7-EC77-4CBA-9E4B-E4BEB3F74A26@laposte.net> <CAFUBMqWFiY+5oHucg83mAG3b3EW-xvjhoPTux_fUqfnp2Ee_Cw@mail.gmail.com> <9E4E7E78-336B-4871-B96A-2C11B4ECCD3B@laposte.net> <CAFUBMqWavEbHKmmUWSWuOZdMm_rHYn0cx3-ZyFUts-R=SRrjvw@mail.gmail.com>
To: Maoke <fibrib@gmail.com>
X-Mailer: Apple Mail (2.1084)
Cc: Softwires WG <softwires@ietf.org>
Subject: Re: [Softwires] Checksum neutrality and L4-protocol independence
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/softwires>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Feb 2012 09:54:51 -0000
Le 2012-02-16 à 03:34, Maoke a écrit > 2012/2/15 Rémi Després <despres.remi@laposte.net> > 2012-02-15 à 03:15, Maoke a écrit : > >> "protocol unknown" should be detected and discarded at both CE and BR in their major module instead of the NAT44 part. > > I don't think so: > - If a CE has a non-shared address, or an IPv4 prefix, BRs shouldn't exclude any protocol in packets sent to this CE. > - If a CE has a shared address, it needs a NAT that the CE informs it the restricted port set. This NAT already has all what is needed to refuse protocols it doesn't understand. > > what if my NAT has understood XXXP but your CE hasn't? to my understanding, CE only informs the restricted port set regardless of the protocol. 2 cases: - If the new protocol has ports at their usual place, and has TCP-like checksum, no problem. "Your CE", as you call it, does forward packets of the new protocol. - In other cases, any CE or BR would need needs an update to work, and incompatibilities cold result. ... > >> A MAP-compliant device supports UDP, TCP, DCCP, SCTP today, > > Not SCTP today, for sure. > Also, as I think you know, there is uncertainty concerning DCCP because RFC6145 sec 4.5 says: > "Other transport protocols (e.g., DCCP) are OPTIONAL to support". > > it depends on the understanding of the "OPTIONAL". if it is OPTIONAL for the operation domain, it is not a problem for double translation. if it is OPTIONAL per device, the uncertainty is a problem where src-translator makes DCCP checksum rewrite but dst-translator doesn't. (inverse case, where src translator doesn't make but dst do, is not a problem though.) Optional "for the operation domain" would work only if there would be means to inform CEs of the choice made for the domain. Such means don't exist, right? > ok, i think we do understand your point but please check. you mean: if addresses are checksum-neutral, we don't need to have a list of supported protocol in BR and just let it pass any protocol with the assumption that it is TCP-layouted/checksumed. if the "any protocol" happens to really have TCP-layout and TCP-checksum, then things are happy and the addresses have ensured the checksum validity even without L4 rewrite. if the "any protocol", unfortunately, happens to have another layout and/or another checksum, then BR also treat it as it were TCP-layouted/checksumed but let it fail at the end host or CE. right? Yes. We are in sync on this point. > > here it is what i said R-22 (3) in 4rd-U is dangerous. it says: > > + If the packet Protocol is not ICMP, bits 0-15 for an > IPv4 source address, and bits 16-31 for a destination > address. > > well doesn't it mean: even if the protocol has another layout, R-22 (3)'s BR prefer to ignore the fact, making messy mapped addresses with blindly assuming the protocol follows the TCP-layout!? (there is no NAT44 before BR to ensure the "unknown" protocol has been dropped.) i would further point out that, the messy mapped destination address may navigate your packet in a wrong direction towards a wrong CE where even the "fail at end" may fail. Still a misunderstanding here. No new protocol will work for shared IPv4 addresses, be it with MAP or 4rd-U BRs, if it isn't a "traditional" protocol (i.e. ports at their usual place, and a TCP-like checksum somewhere). A NAT44 that is coupled with a CE MUST remain operational ONLY for "traditional" protocols. (Future protocols, if not "traditional", will need IPv6 to work safely, including with shared-IPv4-address CEs. > therefore i do agree Ole's argument. because we think any protocol should be certainly supported, or certainly reported as not-supported, rather than blindly trying a seemingly "universal" logic. 1. I don't know which "Ole's argument" you agree to (making your own points directly would be clearer). - In particular, Ole wrote "any A+P solution requires support for L4 protocols to extract ports. L4 checksum rewrite, as well as port extraction will have to be supported for all new L4 protocols." - The fact is that 4rd-U, because of checksum neutrality, doesn't have to support L4 checksum rewrite. Yet, it is an A+P solution that has no identified operational problem. 2. 4rd-U "certainly" supports All "traditional" protocols, an Echo requests in identified conditions, and nothing else. MAP-T is AFAIK uncertain for DCCP. >> btw, regarding the below "new standard for a new problem", i'd like to emphasize it is not a new problem as RFC6052 has discussed it. it is an incorrect understanding to think RFC6052/RFC6145 is designed only for single translation. since the very beginning of the stateless address mapping/translation design, the single and double translations have being considered. > > I have no intention to negate anything about what designers of RFC6052/6145 considered (I wasn't there ;-)). > > The problem which IS NEW is how to design a stateless v4/v6 solution that: > - is AS TRANSPARENT to IPv4 as encapsulation, without any restriction or doubt > > NOT AS TRANSPARENT to IPv4 as encapsulation at least in following 2 points: > > 1) 4rd-H packet's Hop Limit is decreased per hop in the IPv6 domain. this is not a behavior of encapsulation but a behavior of translation. 1. Well, there remains an inconsistency that I didn't see in the 4rd-U draft(!): - "R-4 "Tunnel traffic class", if provided, is the IPv6 traffic class that BRs and CEs MUST set in Tunnel packets. In this case, tunnel traversal is treated in IPv4 as a single-link traversal. Without it, Explicit Congestion Notification of [RFC3168] MAY be propagated from intermediate IPv6 nodes to IPv4 destinations, and IPv4 Time to live values progress with the number of traversed IPv6 links." - Table 2 has: +---------------------+-----------------------------------+ | IPv4 FIELDS | VALUES SET AT DOMAIN EXIT | +---------------------+-----------------------------------+ ... | Time to live | Hop limit | ... +---------------------+-----------------------------------+ Correction should be: "R-4 "Tunnel traffic class", if provided, is the IPv6 traffic class that BRs and CEs MUST set in Tunnel packets. Without it, Explicit Congestion Notification of [RFC3168] MAY be propagated from intermediate IPv6 nodes to IPv4 destinations." Thanks for the opportunity to notice this inconsistency. 2. IPv4 time-to-live of an IPv4 may thus progress by more than one during domain traversal, right, but this isn't a breach to IPv4 end-to-end transparency (the TTL is THE field that always evolve during network traversal). > 2) 4rd-U draft, at R-33, states its IPv6-domain-generated ICMPv6 message will be translated to ICMPv4 with the logic of RFC6145 Sec 5.2. please note that RFC6145 Sec 5.2 is a typical behavior of translation rather than encapsulation. for the encapsulation, the semantics of ICMPv6 message processing should be quite different (cf. RFC2473, Sec 8.) (btw, 4rd-U draft 03 contains the RFC2473 in the reference list but never cites it in the main text). 1. How an IPv6-generated ICMP message is translated into an IPMPv4 message, doesn't belong to "IPv4 transparency". 2. MAP-E has the same need. Otherwise unreachable CEs couldn't be signaled to IPv4 sources, right? The point remains that 4rd-U is "as transparent to IPv4 as MAP-E". This is AFAIK a simple and important fact (it was designed for that). > if we say some fields are transparent, that's ok. > but if we are talking about the IP as a whole, TRANSPARENCY implies not only the consistency of packet header fields but also the behavior of hiding details of the carrying underlay infrastructure. Agreed. (But with due understanding of the exception of time-to-live: it always decreases end to end, and more or less depending on peculiarities of traversed infrastructures). Regards, RD > > > best, > maoke > > - yet works with IPv6-only port-based ACLs and IPv6 Web caches. > In my understanding, 4rd-H is indeed such a solution (and is the only one on the table). > > > Regards, > RD > > PS: Relationship of 4rd-U with single translation XLATs of RFC6145 is a different subject which deserves a discussion thread with another title. > >> ... >
- [Softwires] Moving forward with 4rd-T, 4rd-E & 4r… Alain Durand
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Mouli Chandramouli (moulchan)
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Ole Trøan
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Rémi Després
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Alain Durand
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Ole Trøan
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Rémi Després
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Ole Trøan
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Ole Trøan
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Rémi Després
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Rémi Després
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Tina TSOU
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Rémi Després
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Ole Trøan
- Re: [Softwires] Moving forward with 4rd-T, 4rd-E … Ole Trøan
- [Softwires] MAP & 4rd-U - Preserving freedom of s… Rémi Després
- Re: [Softwires] MAP & 4rd-U - Preserving freedom … Ole Trøan
- [Softwires] Checksum neutrality and L4-protocol i… Rémi Després
- [Softwires] MAP & 4rd-U - Robust Renumbering avoi… Rémi Després
- Re: [Softwires] MAP & 4rd-U - Robust Renumbering … Ole Trøan
- [Softwires] MAP and 4rd-U - how to try to converge Rémi Després
- [Softwires] MAP and 4rd-U Alain Durand
- Re: [Softwires] MAP and 4rd-U Ralph Droms
- Re: [Softwires] MAP and 4rd-U Ole Trøan
- Re: [Softwires] MAP and 4rd-U Reinaldo Penno
- Re: [Softwires] MAP and 4rd-U Jacni Qin
- [Softwires] MAP and 4rd - Feature comparison table Rémi Després
- Re: [Softwires] MAP and 4rd - Feature comparison … Rémi Després
- Re: [Softwires] MAP and 4rd - Feature comparison … Ole Trøan
- Re: [Softwires] MAP and 4rd - Feature comparison … Xing Li
- Re: [Softwires] MAP and 4rd - Feature comparison … Rémi Després
- Re: [Softwires] MAP and 4rd - Relationship with S… Rémi Després
- Re: [Softwires] MAP and 4rd - Feature comparison … Ole Trøan
- Re: [Softwires] MAP and 4rd - Feature comparison … Rémi Després
- Re: [Softwires] Checksum neutrality and L4-protoc… Maoke
- Re: [Softwires] Checksum neutrality and L4-protoc… Rémi Després
- Re: [Softwires] Checksum neutrality and L4-protoc… Maoke
- Re: [Softwires] Checksum neutrality and L4-protoc… Rémi Després
- Re: [Softwires] Checksum neutrality and L4-protoc… Maoke
- Re: [Softwires] Checksum neutrality and L4-protoc… Washam Fan
- Re: [Softwires] Checksum neutrality and L4-protoc… Rémi Després
- Re: [Softwires] Checksum neutrality and L4-protoc… Maoke
- Re: [Softwires] Checksum neutrality and L4-protoc… Maoke
- Re: [Softwires] Checksum neutrality and L4-protoc… Rémi Després
- Re: [Softwires] Checksum neutrality and L4-protoc… Maoke
- Re: [Softwires] Checksum neutrality and L4-protoc… Rémi Després
- Re: [Softwires] Checksum neutrality and L4-protoc… Maoke
- [Softwires] 答复: MAP and 4rd-U Huangjing
- Re: [Softwires] MAP and 4rd - Relationship with S… Xing Li
- Re: [Softwires] MAP and 4rd - Relationship with S… Rémi Després
- Re: [Softwires] MAP and 4rd - Relationship with S… Xing Li
- Re: [Softwires] MAP and 4rd - Relationship with S… Rémi Després
- Re: [Softwires] MAP and 4rd - Relationship with S… Rajiv Asati (rajiva)
- Re: [Softwires] MAP and 4rd - Relationship with S… Rémi Després
- Re: [Softwires] MAP and 4rd - Relationship with S… Xing Li
- Re: [Softwires] MAP and 4rd - Relationship with S… Rémi Després
- Re: [Softwires] MAP and 4rd - Relationship with S… Wojciech Dec
- Re: [Softwires] MAP and 4rd - Relationship with S… Rémi Després
- Re: [Softwires] MAP and 4rd - Relationship with S… Wojciech Dec
- Re: [Softwires] MAP and 4rd - Relationship with S… Rémi Després
- Re: [Softwires] MAP and 4rd - Relationship with S… Wojciech Dec
- Re: [Softwires] MAP and 4rd - Relationship with S… Rémi Després