Re: [tcpm] 793bis: IP ID

David Borman <dab@weston.borman.com> Fri, 20 December 2019 20:37 UTC

Return-Path: <dab@weston.borman.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5D5B1209CF for <tcpm@ietfa.amsl.com>; Fri, 20 Dec 2019 12:37:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PR53_qhJ6Wrf for <tcpm@ietfa.amsl.com>; Fri, 20 Dec 2019 12:37:34 -0800 (PST)
Received: from frantic.weston.borman.com (frantic.weston.borman.com [70.57.156.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 41C5F120859 for <tcpm@ietf.org>; Fri, 20 Dec 2019 12:37:34 -0800 (PST)
Received: from davidbormansmbp.americas.cray.com (msp-nat.cray.com [136.162.2.1]) (authenticated bits=0) by frantic.weston.borman.com (8.14.7/8.14.7) with ESMTP id xBKKgoZL025438 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 20 Dec 2019 14:42:50 -0600
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: David Borman <dab@weston.borman.com>
In-Reply-To: <333A2AF9-7DDD-4FAA-B0BD-E6871564850F@strayalpha.com>
Date: Fri, 20 Dec 2019 14:37:31 -0600
Cc: tcpm@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <F9E41A50-83FA-477C-8E19-5CE6A58931D3@weston.borman.com>
References: <5D669BDA.3000506@erg.abdn.ac.uk> <5D66A044.3060904@erg.abdn.ac.uk> <f4d75224-d7d0-002b-2bca-f93505d6c9d3@mti-systems.com> <4D99C7DD-F57E-4708-8F02-824EB4BF8E24@weston.borman.com> <333A2AF9-7DDD-4FAA-B0BD-E6871564850F@strayalpha.com>
To: Joe Touch <touch@strayalpha.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/z5CyMs5vJPat5swSm-IdZUJhf_Q>
Subject: Re: [tcpm] 793bis: IP ID
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Dec 2019 20:37:37 -0000

Yes, the IPID is only used for doing IP fragment reassembly, so the IPID really doesn’t matter on retransmission when IP fragmentation is not possible.

So just stating that the IPID must not be reused on retransmission unless the packet is identical to the original should be sufficient.  We want to avoid having an implementation reuse IPIDs and cause problems, and then say “but the RFC didn’t say we couldn’t do that”.
			-David

> On Dec 19, 2019, at 8:44 PM, Joe Touch <touch@strayalpha.com> wrote:
> 
> FWIW, the ID is now supposed to be ignored if fragmentation isn’t possible (not source fragmented and not fragmentable).
> 
> Perhaps this advice needs revision accordingly, esp. since TCP generally tries to run in that mode.
> 
> I.e., retransmission should have no bearing on the IPv4 ID unless fragmentation occurs or is possible.
> 
> Joe
> 
>> On Dec 19, 2019, at 9:21 AM, David Borman <dab@weston.borman.com> wrote:
>> 
>> This has to do with the fact that the IPID field is used to do fragmentation reassembly.  It is ok to reuse the same IPID when retransmitting, as long as the retransmitted packet is identical to the original packet, not just the TCP data, but also all the TCP headers.  If the two packets aren’t identical and they are fragmented, then using the same IPID could cause the receiver to not properly reassemble the packet.
>> 
>> What this also says is that, if a TCP implementation is such that it buffers up previously sent packets for possible retransmission and retransmits them verbatim, it doesn’t have to change the IPID just because it is a retransmission.  But if there are any differences between the original and the retransmitted packet, then the IPID must be updated.
>> 
>> 			-David Borman
>> 
>>> On Dec 19, 2019, at 11:04 AM, Wesley Eddy <wes@mti-systems.com> wrote:
>>> 
>>> While I think Gorry's comment below is pretty much correct, this is direct from RFC 1122's material on TCP.  I'm proposing not to change anything about this at the moment, since I don't think any harm is done by saying this.
>>> 
>>> On 8/28/2019 11:39 AM, Gorry Fairhurst wrote:
>>>> Section 3.8.1
>>>> OLD:
>>>>  If a retransmitted packet is identical to the original packet (which
>>>>  implies not only that the data boundaries have not changed, but also
>>>>  that the window and acknowledgment fields of the header have not
>>>>  changed), then the same IP Identification field MAY be used (see
>>>>  Section 3.2.1.5 of RFC 1122) (MAY-4).
>>>> - What is this MAY about? Is it about the IPv4 IPID field and is that really
>>>> important for a TCP spec? 
>>> 
>>> _______________________________________________
>>> tcpm mailing list
>>> tcpm@ietf.org
>>> https://www.ietf.org/mailman/listinfo/tcpm
>>> 
>> 
>> _______________________________________________
>> tcpm mailing list
>> tcpm@ietf.org
>> https://www.ietf.org/mailman/listinfo/tcpm
> 
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm
>