Re: [Softwires] MAP draft 11 question on fragment ID space reduction

Joe Touch <touch@isi.edu> Tue, 14 October 2014 17:41 UTC

Return-Path: <touch@isi.edu>
X-Original-To: softwires@ietfa.amsl.com
Delivered-To: softwires@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE7F51A90E9 for <softwires@ietfa.amsl.com>; Tue, 14 Oct 2014 10:41:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.986
X-Spam-Level:
X-Spam-Status: No, score=-4.986 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.786] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lEXtOVjLJQsC for <softwires@ietfa.amsl.com>; Tue, 14 Oct 2014 10:41:23 -0700 (PDT)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F35D1A90DE for <softwires@ietf.org>; Tue, 14 Oct 2014 10:41:23 -0700 (PDT)
Received: from [128.9.160.211] (mul.isi.edu [128.9.160.211]) (authenticated bits=0) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id s9EHdrMH000602 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Tue, 14 Oct 2014 10:39:53 -0700 (PDT)
Message-ID: <543D5FE8.6080804@isi.edu>
Date: Tue, 14 Oct 2014 10:39:52 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.1.2
MIME-Version: 1.0
To: Ole Troan <otroan@employees.org>, Andrew Yourtchenko <ayourtch@gmail.com>
References: <CAPi140MdbJQBLSRS+g4Jx0G1zm1dx6PLBBQ7oPeALU2z-Vp81g@mail.gmail.com> <C51ECE96-003E-41F9-A2B8-1046F041AE99@employees.org>
In-Reply-To: <C51ECE96-003E-41F9-A2B8-1046F041AE99@employees.org>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/softwires/qay-BxuwzTyukXVM0apbCz05_3A
X-Mailman-Approved-At: Tue, 14 Oct 2014 10:53:13 -0700
Cc: Tetsuya Murakami <tetsuya@ipinfusion.com>, 包丛 笑 <congxiao@cernet.edu.cn>, Matsushima Satoru <satoru.matsushima@g.softbank.co.jp>, Softwires WG <softwires@ietf.org>, wdec <wdec@cisco.com>
Subject: Re: [Softwires] MAP draft 11 question on fragment ID space reduction
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/softwires/>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Oct 2014 17:41:26 -0000


On 10/14/2014 2:58 AM, Ole Troan wrote:
...
> splitting the fragment id space so that there is only a single bit 
> per CPE sounds like a corner case that should be disallowed. I don't
> know if we have the knowledge to be able to specify exactly how much
> of the fragment id space is safe to split up though.is it 4, 6, or 8
> bits?

As per RFC 6864, the IPv4 ID space is small and use of that space needs
to consider the number of current IP packets being reassembled, i.e.,
the reordering likely to occur.

It might be safe to use a space one bit larger than the amount of
reordering, but I'd prefer two.

So the key question is:

	- how much fragment reordering to you expect *within*
	a given IP address pair/transport tuple?

I don't know the answer to that, but log2(reordering) + 2 ought to be a
lower bound on the space that might overlap.

I.e., I doubt you should ever allow 1-2 bits. I would expect a minimum
of 4 bits but the appropriate answer depends on the reordering you're
trying to protect against.

NOTE: I would strongly encourage an encapsulation that includes its own
checksum to protect against incorrect reassembly (if that's not already
included; I haven't checked the draft).

Joe