Re: [Tsv-art] TSV-ART Telechat review of draft-ietf-6man-rfc1981bis-04

"Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net> Mon, 08 May 2017 15:50 UTC

Return-Path: <ietf@kuehlewind.net>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC0C8127275 for <tsv-art@ietfa.amsl.com>; Mon, 8 May 2017 08:50:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.003
X-Spam-Level:
X-Spam-Status: No, score=-2.003 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); domainkeys=pass (1024-bit key) header.from=ietf@kuehlewind.net header.d=kuehlewind.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b6JWQlK_SFp9 for <tsv-art@ietfa.amsl.com>; Mon, 8 May 2017 08:50:00 -0700 (PDT)
Received: from kuehlewind.net (kuehlewind.net [83.169.45.111]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CCAF126B6E for <tsv-art@ietf.org>; Mon, 8 May 2017 08:50:00 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=kuehlewind.net; b=bgT0uzBl05UxVECchfwDHoTvG3HZsOOTh5izaSXETlQR3LRsG0De/GLVM1A0Fk/rxhqy10Di+VZHXgh8ZJqRv59cf/OPjLo5l3eksuw7fTpyhrdBvDScAKObe189DlpyywEtLYDsc3x0+iLA2ywFS7rXwfCbtvej7cs16lQB4w8=; h=Received:Received:Content-Type:Mime-Version:Subject:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-PPP-Message-ID:X-PPP-Vhost;
Received: (qmail 11620 invoked from network); 8 May 2017 17:49:57 +0200
Received: from p5dec259c.dip0.t-ipconnect.de (HELO ?192.168.178.33?) (93.236.37.156) by kuehlewind.net with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 8 May 2017 17:49:57 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
From: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
In-Reply-To: <48bfa3a1-e53c-6b31-69b0-2645ddd5937f@isi.edu>
Date: Mon, 08 May 2017 17:49:56 +0200
Cc: "tsv-art@ietf.org" <tsv-art@ietf.org>, Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Content-Transfer-Encoding: quoted-printable
Message-Id: <5AB999EB-EB4D-46D0-A9B8-20B0E1817896@kuehlewind.net>
References: <48bfa3a1-e53c-6b31-69b0-2645ddd5937f@isi.edu>
To: Joe Touch <touch@isi.edu>
X-Mailer: Apple Mail (2.3273)
X-PPP-Message-ID: <20170508154957.11614.64833@lvps83-169-45-111.dedicated.hosteurope.de>
X-PPP-Vhost: kuehlewind.net
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/LWLI9IYRtfc--ie5lZl-6CLjVyM>
Subject: Re: [Tsv-art] TSV-ART Telechat review of draft-ietf-6man-rfc1981bis-04
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 May 2017 15:50:02 -0000

Hi Joe,

given I’ve seen no additional discussion on this thread, did you check/can you check if the latest version (-06) addresses your comments?

Thanks!
Mirja


> Am 15.02.2017 um 22:51 schrieb Joe Touch <touch@isi.edu>:
> 
> Document: draft-ietf-6man-rfc1981bis-04
> Reviewer: Joe Touch
> Review Date: February 15, 2017
> IETF LC End Date: March 3, 2017
> IESG Telechat date: February 28, 2017
> 
> Review result: significant issues
> 
> NOTE: some of this review is informed by tracking some of the issues raised by others on the IETF list, notably Gorry Fairhurst.
> 
> Major issues:
> 
> 1) the current text is insufficiently realistic about the (in)ability of this mechanism to operate in current networks, regardless of the support for generating ICMPs at routers or PMTUD support at endpoints, due to ICMP filtering for security reasons. [this comment is already being addressed by consensus text]
> 
> 2) the current text is insufficiently clear on on the difference between the path MTU, which determines the largest supported IPv6 fragment, vs. the effective MTU to receive (EMTU_R), which determines the largest IP packet that can transit between the source and destination. The document should be more explicit throughput about its goal being to manage or avoid IPv6 source fragmentation rather than about source to destination packet maximums, and in specific in clearly referring to maximum fragments or atomic packets rather than maximum packets.
> 
> E.g.: see the following text, which is incorrect in its current form:
>    Nodes not implementing Path MTU Discovery use the IPv6 minimum link
>    MTU defined in [
> I-D.ietf-6man-rfc2460bis
> ] as the maximum packet size.
> 
> The value used by either Path MTU Discovery or its default represents the path MTU, which is the largest IPv6 *fragment* (or atomic packet, see RFC6864) that can be supported on the path between the endpoints. The maximum IP packet size is limited by the effective MTU to receive (EMTU_R) [RFC1122], which is at least 1500 bytes for IPv6 and not necessarily related to the link MTUs. The text should also clearly indicate that there is no ICMP mechanism for determining larger EMTU_R support.
> 
> E.g., the following text is also incorrect in its current form:
>    The value sent in the TCP MSS option is independent of the PMTU.
>    This MSS option value is used by the other end of the connection,
>    which may be using an unrelated PMTU value. 
> 
> The first sentence is correct because TCP MSS is related to EMTU_R (and needs to account for headers, as per RFC6691), and EMTU_R is not directly related to the PMTU (except that it would never be smaller than the PMTU). The MSS option is calculated from EMTU_R, not PMTU.
> 
> In addition, it should be noted that ICMPv6 PTB messages are NOT sent when source fragmentation is enabled.
> 
> 3. need verification of current support for some features, esp. regarding TCP and NFS interactions
> See Gorry's note of 2/14/17
> 
> 4. the concept of a single path MTU value between two IP addresses does not account for multipath routing, e.g., ECMP (as currently deployed, noted in RFC7690, which should be cited) or BANANA (and its solutions in development) See Fred Templin's posts on this on 2/15/17
> 
> Minor issues:
> 
> - some of the updates and/or current text could be updated to reflect current terminology or practice. See Gorry Fairhursts's post of 2/14/17
> 
> - fragmentation, while considered harmful and costly, is absolutely necessary to support tunnels even in the presence of PMTUD. The text on this issue should reflect this reality.
> 
> - the requirement that transports be notified of PTB messages might usefully cite the corresponding IPv4, TCP, and UDP sections of RFC1122
> 
> - section 5.4 should cite and include context from RFC6691, especially including a discussion of the impact of variable IP EHs on the interaction between TCP MSS and ICMP PTB
> 
> --
> 
> 
> 
>