[tcpm] PLPMTUD for all protocols

Mikael Abrahamsson <swmike@swm.pp.se> Wed, 28 March 2018 08:43 UTC

Return-Path: <swmike@swm.pp.se>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76C41124C27 for <tcpm@ietfa.amsl.com>; Wed, 28 Mar 2018 01:43:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.311
X-Spam-Level:
X-Spam-Status: No, score=-4.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=swm.pp.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H6uptjegxNsP for <tcpm@ietfa.amsl.com>; Wed, 28 Mar 2018 01:43:42 -0700 (PDT)
Received: from uplift.swm.pp.se (ipv6.swm.pp.se [IPv6:2a00:801::f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D30FD1200C1 for <tcpm@ietf.org>; Wed, 28 Mar 2018 01:43:41 -0700 (PDT)
Received: by uplift.swm.pp.se (Postfix, from userid 501) id 72B32B1; Wed, 28 Mar 2018 10:43:40 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=swm.pp.se; s=mail; t=1522226620; bh=atJD3lgzsuGg43gGr7QC3NRDOAePjfuCSl+LzP68shE=; h=Date:From:To:Subject:From; b=1pTC1lgRfu44Nd5kaJbDO2v+az+kV3OG1yaC9GeKXbWFwAE+dGmkfuLoh4vFifdfC HCP7EOx19WFBD+Vthb4cr27uCCO/JEJUD6i5Bf+Op5QKUKplqJb8wmRaB1hs+vltUo 1liXJ5t144NfsTsdZTvs1Whw0FctMGSFMLwITRu0=
Received: from localhost (localhost [127.0.0.1]) by uplift.swm.pp.se (Postfix) with ESMTP id 70C309F for <tcpm@ietf.org>; Wed, 28 Mar 2018 10:43:40 +0200 (CEST)
Date: Wed, 28 Mar 2018 10:43:40 +0200
From: Mikael Abrahamsson <swmike@swm.pp.se>
To: tcpm@ietf.org
Message-ID: <alpine.DEB.2.20.1803281034310.20609@uplift.swm.pp.se>
User-Agent: Alpine 2.20 (DEB 67 2015-01-07)
Organization: People's Front Against WWW
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/vr6ke1aYuPle26VkpYmMrI2aHHg>
Subject: [tcpm] PLPMTUD for all protocols
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Mar 2018 08:43:43 -0000

Hi,

In trying to advocate for all protocols implementing PLPMTUD (RFC4821) and 
shipping with it default on, I received pushback when I suggested/asked 
why modern TCP stacks don't come with PMTU blackhole detect turned on.

Relevant reading is draft-bonica-intarea-frag-fragile-01, where PMTU 
blackhole is one part of this problem space.

I tried turning on PMTU blackhole in Linux quickly in a case I had, and it 
worked around the PMTU blackhole we had for a certain deployment scenario 
(which couldn't be fixed unless the NMS could reconfigure the device in 
question, which it couldn't because PMTU blackhole existed).

People suggested to me that the current TCP stack implementations are 
broken when it comes to PMTU blackhole detection and workaround, so that's 
why it's not on.

What's wrong with it, and how do we fix it?

-- 
Mikael Abrahamsson    email: swmike@swm.pp.se