Re: [tsvwg] FW: New Version Notification for draft-leddy-6man-truncate-03.txt

Ron Bonica <rbonica@juniper.net> Tue, 19 June 2018 17:25 UTC

Return-Path: <rbonica@juniper.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A3E613119E; Tue, 19 Jun 2018 10:25:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NRISSpU7EtT2; Tue, 19 Jun 2018 10:25:31 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50BB613119D; Tue, 19 Jun 2018 10:25:28 -0700 (PDT)
Received: from pps.filterd (m0108163.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w5JGXrSL032668; Tue, 19 Jun 2018 09:36:15 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=PPS1017; bh=G7Z9EckxFxUz0Bv1eu3ferLEkU3lxwfo47z71qCtOf8=; b=yIAcdc7mLfEShWuFg0tbCj7FyaLBeikLbD2YifiRSlhtDj+XHHaj6Pyh6XA/MtHyKb8R 9PxkyInIvl66G6676Zqu8CdZkQwDaft6djFpXrBTE3yRBO/7ATdEO/kBP3IxZn/5cPR4 9tUo7DyDFfQoBLaYslFqevZHK9gCZmaeWhxa4vfEI4tF6AYDIuwNmxFKKcF7ajPQOTKB fJIW/CH0HDB9JeU+d8TrocPytmYtFUNu2tvUgfsHpT3wcmlgk3OVJOdmbLXrCZDsm4Hf oZkIMhug7y2JF2TOFagansJnJMbTymBkVYfir9MbSmIGQYMR4ogkDkktggR/YvOmKDGm CA==
Received: from nam05-by2-obe.outbound.protection.outlook.com (mail-by2nam05lp0246.outbound.protection.outlook.com [216.32.181.246]) by mx0b-00273201.pphosted.com with ESMTP id 2jq0ayrhdw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Tue, 19 Jun 2018 09:36:15 -0700
Received: from CO1PR05MB443.namprd05.prod.outlook.com (10.141.73.152) by CO1PR05MB457.namprd05.prod.outlook.com (10.141.72.141) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.884.14; Tue, 19 Jun 2018 16:36:13 +0000
Received: from CO1PR05MB443.namprd05.prod.outlook.com ([fe80::312a:3c1:f69:c7fb]) by CO1PR05MB443.namprd05.prod.outlook.com ([fe80::312a:3c1:f69:c7fb%13]) with mapi id 15.20.0884.010; Tue, 19 Jun 2018 16:36:12 +0000
From: Ron Bonica <rbonica@juniper.net>
To: Tom Jones <tom@erg.abdn.ac.uk>, "draft-leddy-6man-truncate@ietf.org" <draft-leddy-6man-truncate@ietf.org>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] FW: New Version Notification for draft-leddy-6man-truncate-03.txt
Thread-Index: AQHUAaHD5P4MUTF86U++/9A7XgU/kqRbS6/wgAFifcCABGIeAIAGuQUQ
Date: Tue, 19 Jun 2018 16:36:12 +0000
Message-ID: <CO1PR05MB4435C62782022B6636DF741AE700@CO1PR05MB443.namprd05.prod.outlook.com>
References: <CO1PR05MB4430CF94EB5AA6C7DEEA4E6AE7F0@CO1PR05MB443.namprd05.prod.outlook.com> <20180615091758.GA17192@tom-desk.erg.abdn.ac.uk>
In-Reply-To: <20180615091758.GA17192@tom-desk.erg.abdn.ac.uk>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.0.300.84
dlp-reaction: no-action
x-mcafeedlp-tagged: True
x-originating-ip: [66.129.241.11]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CO1PR05MB457; 7:QJK7NeQw/9HBLNbW6jiKbnQr79g19RynKbkCWudmS6iTo+CX/PhIWbdMtMUZY9ZEJmCDqcjHxXCa24kGf5npU0gOH4wwEaYo3Pdn4CKaOZN9wJgNIGKc6yJ7dub/fFf4opsf99yhfg1eG+ZSv0aclaTCKcH/lgt4Ne9WU4o73P4Hn2hdnZXpJsxGNnULmfipzRl07NNtFWkzRDLQm9iE+ZwrIThLHEMsQGBN0S+1YJk4EemuuSyf6TTMjOFNnJ5j
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: d8b698a9-2e89-4a9f-b644-08d5d602c526
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:(130329453890623); BCL:0; PCL:0; RULEID:(7020095)(4652020)(4534165)(4627221)(201703031133081)(201702281549075)(5600026)(711020)(48565401081)(2017052603328)(7153060)(7193020); SRVR:CO1PR05MB457;
x-ms-traffictypediagnostic: CO1PR05MB457:
x-microsoft-antispam-prvs: <CO1PR05MB4577EB143DF962B07AA4D32AE700@CO1PR05MB457.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(138986009662008)(130329453890623);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231254)(944501410)(52105095)(3002001)(10201501046)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(20161123560045)(20161123564045)(201703131423095)(201703031522075)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123562045)(6072148)(201708071742011)(7699016); SRVR:CO1PR05MB457; BCL:0; PCL:0; RULEID:; SRVR:CO1PR05MB457;
x-forefront-prvs: 07083FF734
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(346002)(396003)(366004)(39860400002)(39380400002)(25584004)(13464003)(189003)(199004)(51444003)(51914003)(8676002)(81156014)(81166006)(8936002)(3846002)(14454004)(68736007)(478600001)(476003)(6116002)(97736004)(66066001)(5660300001)(33656002)(2900100001)(53546011)(102836004)(11346002)(316002)(446003)(486006)(296002)(6506007)(26005)(3660700001)(2906002)(110136005)(186003)(3280700002)(74316002)(4326008)(5250100002)(2501003)(305945005)(25786009)(106356001)(86362001)(7736002)(105586002)(229853002)(6436002)(99286004)(53936002)(9686003)(7696005)(15650500001)(59450400001)(55016002)(6246003)(76176011); DIR:OUT; SFP:1102; SCL:1; SRVR:CO1PR05MB457; H:CO1PR05MB443.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: p4NCJQoId7xd3i+/emR9cg0f37uk46s4MQxPWAfwHkADQCux4s3rBxukKoVcjQcKiIoDl5AcIRXRtqdgDvsnHO3rhV74kTxHAlDbaBChbIjoSEQH4aXdsAdrrdih84S0Xt7cu46fzCWJoYG7Mx+eHk3DXWnsUSrKXgcQOwXW31mQ6oB8TAjD53Aq9vsSVLtDEe6L022wlgn0yrt4SFf62xq3J97gSm9ZTN4bkw49hPpiFi70fRT12iZ97mvMP+2DFvH/dimgsP0XxPtb0G0Xfz/fwff9GEcpE1nR/9wNRZj+EhXzlg6MPlEUZndsT9mcRL7pywhJr4o1agQPFZb+kA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: d8b698a9-2e89-4a9f-b644-08d5d602c526
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jun 2018 16:36:12.7626 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR05MB457
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-06-19_09:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1805220000 definitions=main-1806190183
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/2gyVPm8mwXAAJZeAmbv9nFN2ZUU>
Subject: Re: [tsvwg] FW: New Version Notification for draft-leddy-6man-truncate-03.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Jun 2018 17:25:35 -0000

Hi  Tom,

Thanks for the thoughtful review. Responses inline.....

                                  Ron

> -----Original Message-----
> From: Tom Jones <tom@erg.abdn.ac.uk>
> Sent: Friday, June 15, 2018 5:18 AM
> To: Ron Bonica <rbonica@juniper.net>; draft-leddy-6man-truncate@ietf.org
> Cc: tsvwg@ietf.org
> Subject: Re: [tsvwg] FW: New Version Notification for draft-leddy-6man-
> truncate-03.txt
> 
> Hello,
> 
> I have read this draft and think it proposes an interesting probing mechanism
> for PMTUD. I have some questions and comments:
> 
> 1.
> 
>     IPv6 allows fragmentation at the source node only.
> 
> This needs a ref to Section 3 of RFC2460 and I suspect a reference to draft-
> bonica-intarea-frag-fragile-01. It would help to expand a little and explain
> some of the issues with fragmentation.

The previous paragraph already has a reference to RFC 8200. RFC 8200 obsoletes RFC 2400. 

A reference to draft-bonica-intarea-frag-fragile may be appropriate. However, I am reluctant to add that reference before  draft-bonica is adopted by the INTAREA WG. Let's add that reference if an when draft-bonica is adopted.

> 
> 2.
> 
> PTB delivery might also fail if the IPv6 PTB does not carry enough information
> to validate the PTB packet. This is discussed in Section 1.1. (Classical Path
> MTU Discovery) of Datagram PLPMTUD.
> 
> Appendix C of [RFC4960] also has some considerations for PTB verification.

Good point. I will add text to the final bullet list in Section 3 of draft-ledd-6man-truncate.

> 
> 3.
> 
>           0                   1                   2
>           0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
>          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>          |  Option Type  |  Opt Data Len |T|D|R| Reserved|
>          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 
>                                  Figure 2
> 
> TCP does not carry a length field in its header, instead it uses the total length
> field in IPv4 and the payload length in IPv6, modifying this value may make it
> difficult or impossible for the receiving TCP to find the intended end of
> segment.  This option needs to carry enough information to reproduce the
> original payload length field.
> 
> I suggest adding the original payload length to the option, like so:
> 
>  0                   1                   2                   3
>  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 0
> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-+-+-+-+
> |  Option Type  |  Opt Data Len |T|D|R| Reserved|   Original Payload Length
> |
> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
> +-+-+-+-+
> 
>                              Figure 2
> 
> This will require increasing the option length from 1 to 3.
> 

Does TCP need to know the Original Payload Length? What would it do with this information if it had it?

I suspect that there is a good use for this data, but I am curious to know what it is.

> 4.
> 
>    o  T - Indicates that the packet has been truncated.  If the packet
>       has not been truncated, it SHOULD be delivered to an upper-layer
>       protocol.
> 
>    o  D - Indicates that the packet SHOULD be delivered to an upper-
>       layer protocol even if it has been truncated.  If the D-bit is set
>       to zero, the packet MUST NOT be delivered to an upper-layer
>       protocol if it has been truncated.
> 
>    o  R - Request to deliver truncated packets.
> 
> It is not clear to me what the R bit is for. Is it for the sending node to indicate
> that packets sent to it may have the D bit set?
> 
> This text from section 8 makes me think it is a negotiation flag.
> 
>    Alternatively, other upper-layer protocols developed
>    in the future might set the D-bit only after receiving a Truncation
>    option with the R-bit set.
> 
> 
Yes, it is used for negotiation. But is this flag useful to upper-layer protocols? If it is not, I would be happy to remove it.

> 5.
> 
>    NOTE 1: The highest-order two bits of the Option Type (i.e., the
>    "act" bits) are 10.  These bits specify the action taken by a
>    destination node that does not recognize Truncation option.  The
>    required action is to discard the packet and, regardless of whether
>    or not the packet's Destination Address was a multicast address, send
>    an ICMP Parameter Problem, Code 2, message to the packet's Source
>    Address, pointing to the unrecognized Option Type.
> 
> Is this not the expected behaviour now?

Yes, this paragraph quotes RFC 8200. The act bits specify the action taken by a destination node that does not recognize Truncation option. Bits 10 indicated that the destination node must discard the packet and send and ICMP message.

I am quoting RFC 8200 a) for those who haven't memorized the bit-values and b) to satisfy my obsessive-compulsive tendencies ;-)

> 
> Would a future rev have the destination node modify these bits to indicate it
> supports the option and there was another error?
> 

I'm not sure that I understand the question. Could you elaborate?

> 6.
> 
>    NOTE 2: The third highest-order bit of the Option Type (i.e., the
>    "chg" bit) is 1.  This indicates that Option Data can be modified
>    along the path between the packet's source and its destination.
> 
> In which circumstances would this be used? It seems strange to me that the
> sending node would set bits and then allow them to not be end to end.

The truncating node sets the T-bit. It wouldn't be allowed to do that unless the chg bit was set.
> 
> 7.
> 
> In the second example in section 2 are the T D R bits set as they were in the
> first example?
> 
I think that you mean Section 7.

In this example, the T D and R bits are the same as in the previous section. I will make that clear in the next version of the document.

> 8.
> 
>    A truncated packet MUST contain the basic IPv6 header, all extension
>    headers and the first upper-layer header.  When a router cannot
>    forward a packet through the next-hop link due to MTU issues, and the
>    total length of the basic IPv6 header, all extension headers, and
>    first upper-layer header exceeds the MTU of the next-hop link, the
>    router MUST discard the packet and send and ICMP PTB message to the
>    source.
> 
> Ref RFC7112 here.

RFC 7112 has been obsoleted by RFC 8200. RFC 8200 includes the above-mentioned rule.

> 
> What does a router do when it receives a truncated packet without the full
> header chain?
> 

It MUST discard the packet. I will add that in the next revision.

                                                                   Ron

> - [tj]
> 
> --
> - [tj]