Re: [v4tov6transition] [Softwires] 6a44 MTU issues

"Templin, Fred L" <Fred.L.Templin@boeing.com> Wed, 13 October 2010 20:03 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: v4tov6transition@core3.amsl.com
Delivered-To: v4tov6transition@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3038F3A6A43; Wed, 13 Oct 2010 13:03:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.054
X-Spam-Level:
X-Spam-Status: No, score=-6.054 tagged_above=-999 required=5 tests=[AWL=0.245, BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xjEsamICRKQX; Wed, 13 Oct 2010 13:03:29 -0700 (PDT)
Received: from slb-smtpout-01.boeing.com (slb-smtpout-01.boeing.com [130.76.64.48]) by core3.amsl.com (Postfix) with ESMTP id 3B8743A69C7; Wed, 13 Oct 2010 13:03:29 -0700 (PDT)
Received: from stl-av-01.boeing.com (stl-av-01.boeing.com [192.76.190.6]) by slb-smtpout-01.ns.cs.boeing.com (8.14.4/8.14.4/8.14.4/SMTPOUT) with ESMTP id o9DK4fw0007500 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Wed, 13 Oct 2010 13:04:42 -0700 (PDT)
Received: from stl-av-01.boeing.com (localhost [127.0.0.1]) by stl-av-01.boeing.com (8.14.4/8.14.4/DOWNSTREAM_RELAY) with ESMTP id o9DK4f6a026276; Wed, 13 Oct 2010 15:04:41 -0500 (CDT)
Received: from XCH-NWHT-06.nw.nos.boeing.com (xch-nwht-06.nw.nos.boeing.com [130.247.25.110]) by stl-av-01.boeing.com (8.14.4/8.14.4/UPSTREAM_RELAY) with ESMTP id o9DK4fjX026265 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=OK); Wed, 13 Oct 2010 15:04:41 -0500 (CDT)
Received: from XCH-NW-01V.nw.nos.boeing.com ([130.247.64.97]) by XCH-NWHT-06.nw.nos.boeing.com ([130.247.25.110]) with mapi; Wed, 13 Oct 2010 13:04:40 -0700
From: "Templin, Fred L" <Fred.L.Templin@boeing.com>
To: Rémi Després <remi.despres@free.fr>
Date: Wed, 13 Oct 2010 13:04:39 -0700
Thread-Topic: [Softwires] [v4tov6transition] 6a44 MTU issues
Thread-Index: Actq7a4+vKI5ocxmTSm17glocpyFAgAIXs+w
Message-ID: <E1829B60731D1740BB7A0626B4FAF0A65C59BDE714@XCH-NW-01V.nw.nos.boeing.com>
References: <C8D29306.3EDBD%yiu_lee@cable.comcast.com><E1829B60731D1740BB7A0 626B4FAF0A65C59B79387@XCH-NW-01V.nw.nos.boeing.com><E1829B60731D1740BB7A062 6B4FAF0A65C59B79491@XCH-NW-01V.nw.nos.boeing.com><AANLkTik0_9CRSfi_O53MChgt 5QH+-=aR8HO7v+fHiLwY@mail.gmail.com><D8BB9123-C611-4476-AFA1-D0ADEEDB6270@f ree.fr><E1829B60731D1740BB7A0626B4FAF0A65C59B797F3@XCH-NW-01V.nw.nos.boeing .com><279A3292-A291-4BC0-8FCF-53120066931E@free.fr><E1829B60731D1740BB7A062 6B4FAF0A65C59B7982A@XCH-NW-01V.nw.nos.boeing.com><E1829B60731D1740BB7A0626B 4FAF0A65C59B79898@XCH-NW-01V.nw.nos.boeing.com><0DD3B2BD-0200-4CC9-A78F-9AB 9F574FA3A@free.fr><E1829B60731D1740BB7A0626B4FAF0A65C59BDE54A@XCH-NW-01V.nw.nos.boeing.com> <6500B1FF-20D9-4311-977F-85890A29634C@free.fr>
In-Reply-To: <6500B1FF-20D9-4311-977F-85890A29634C@free.fr>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: Softwires <softwires@ietf.org>, "v4tov6transition@ietf.org" <v4tov6transition@ietf.org>
Subject: Re: [v4tov6transition] [Softwires] 6a44 MTU issues
X-BeenThere: v4tov6transition@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <v4tov6transition.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/v4tov6transition>, <mailto:v4tov6transition-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v4tov6transition>
List-Post: <mailto:v4tov6transition@ietf.org>
List-Help: <mailto:v4tov6transition-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v4tov6transition>, <mailto:v4tov6transition-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Oct 2010 20:03:32 -0000

Hi Remi, 

> -----Original Message-----
> From: softwires-bounces@ietf.org 
> [mailto:softwires-bounces@ietf.org] On Behalf Of Rémi Després
> Sent: Wednesday, October 13, 2010 8:43 AM
> To: Templin, Fred L
> Cc: Softwires; v4tov6transition@ietf.org
> Subject: Re: [Softwires] [v4tov6transition] 6a44 MTU issues
> 
> 
> Le 13 oct. 2010 à 17:17, Templin, Fred L a écrit :
> 
> > Hi Remi, 
> > 
> >> -----Original Message-----
> >> From: softwires-bounces@ietf.org 
> >> [mailto:softwires-bounces@ietf.org] On Behalf Of Rémi Després
> >> Sent: Tuesday, October 12, 2010 12:26 AM
> >> To: Templin, Fred L; Washam Fan
> >> Cc: Softwires; v4tov6transition@ietf.org
> >> Subject: Re: [Softwires] [v4tov6transition] 6a44 MTU issues
> >> 
> >> Fred and Washam,
> >> 
> >> I reacted too fast to previous remarks when I proposed to 
> >> modify the accepted IPv6 MTU in 6a44 draft.
> >> If IPv6 packets longer than 1280 would be accepted by 6a44 
> >> servers, hosts could receive them in fragmented IPv4 datagrams.
> > 
> > Or they might be reassembled in the NAT(s) in front of
> > the host.
> They would indeed.
> But they would then be forwarded across the customer network.
> There, they may somewhere be fragmented to fit into fragments 
> shorter than the ISP MTU + 28.
> This happens for example if the ISP IPv6 MTU would be 1500-28 
> and that of some link in the customer site would be 1500-40 
> (say, for an IPv4 in IPv6 tunnel). 
> Right?

The fact of life is that we have the ISP managed network
domain and the end user network unmanaged network domain,
whether the ISP controls the CPE or not. The managed domain
should be well-behaved, but any manner of MTU irregularities
is possible within the unmanaged domain. For example, I can
login to my Linksys home router and manually set the MTU to
any value I want.

Anything that can be configured can be mis-configured, and
the ISP has no control of any misconfigurations that might
occur in the end user network. As far as the ISP can tell,
the end user network is just a black hole that silently
consumes packets. 
 
> >> This would be contrary to the objective of simplicity 
> >> (datagram reassembly would have to be include in 6a44 
> >> clients) and to the objective of security (a new door would 
> >> be open to dos attacks).
> >> No change on this point will therefore appear in the next 
> >> version of the draft. 
> >> Some additional explanations may be appropriate, but 
> >> preferably after a consensus on what has to be said.
> >> 
> >> Then the MTU issue of IPv6 in IPv6 tunnels that Fred 
> >> underlines remains as is.
> > 
> > Right.
> > 
> >> If the PMTU of such a tunnel is unknown, or known to be less 
> >> than 1280+40,
> > 
> > Actually, 1280+40+IPsec headers and trailers in the case
> > of VPN.
> 
> I was only discussing the direct IPv6 in IPv6 case.
> But, yes, it is in general 1280 + the encapsulation header, 
> whatever its size.

Right, and whatever size the encapsulation header it makes
the underlying 1280 MTU insufficient for efficient operation.

> >> tunnel endpoints have to tunnel 1280-octets 
> >> external packets in two pieces, using a fragmented IPv6 
> >> datagram for this.
> > 
> > OK, so steady-state IPv6 fragmentation and reassembly between
> > VPN tunnel endpoints is expected as normal operation in this
> > model.
> 
> Yes.
> (A consequence of privileging connectivity and stateless operation).

That could become onerous. Let's say that an IPv6 tunnel
is configured over an IPv6-in-IPv4 tunnel with MTU=1280.
Then, the IPv6 packets would be fragmented into packet
pairs with the first being 1280 and the second being
80 bytes. That means that there would be a long/short
packet pair sent whereas a single long packet could be
sent if the IPv6-in-IPv4 tunnel had a slightly larger MTU.

One of the benefits of keeping a small amount of state is
that black hole detection is made possible such that a
larger tunnel MTU can be configured. This would lead to
more efficient handling of packets that are just slightly
larger than 1280.

> >> Reassembly at the other end is then necessary. 
> >> It can be facilitated if the tunnel is treated as only one 
> >> flow,
> > 
> > Can you say more about what you mean by this?
> 
> I mean that, because packets are almost always kept in 
> sequence for a flow (otherwise TCP efficiency would be in 
> general very poor) reassembly can be limited to consecutive 
> fragments of only one datagram (the one being currently reassembled).
> A packet permutation that interleaves fragments of two 
> different datagrams leads in this case to a loss (but with 
> low enough a frequency for it to be acceptable). 
> This is significantly simpler than in the case where 
> fragments of many datagrams my be interleaved.

Well, reordering and duplication are always possible within
the network. But, I'm not sure here whether you are referring
to IPv6 reassembly in the end system or IPv4 reassembly in
the network. The former should work, while the latter has
known issues at high data rates (RFC4459). Both are inefficeint.

Thanks - Fred
fred.l.templin@boeing.com

> >> with packets in general kept in sequential order.
> > 
> > In-order delivery is not a strict requirement for
> > correct IPv6 reassembly - but the fact that steady-state
> > IPv6 frag/reass is required seems onerous.
> 
> See just above.
> 
> Regards,
> RD
> 
> 
> 
> 
> _______________________________________________
> Softwires mailing list
> Softwires@ietf.org
> https://www.ietf.org/mailman/listinfo/softwires
>