Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop

Mark Smith <markzzzsmith@yahoo.com.au> Sun, 28 October 2012 20:08 UTC

Return-Path: <markzzzsmith@yahoo.com.au>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2638E21F863F for <v6ops@ietfa.amsl.com>; Sun, 28 Oct 2012 13:08:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.501
X-Spam-Level:
X-Spam-Status: No, score=0.501 tagged_above=-999 required=5 tests=[BAYES_50=0.001, FROM_LOCAL_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J6tb5XOUAY-6 for <v6ops@ietfa.amsl.com>; Sun, 28 Oct 2012 13:08:37 -0700 (PDT)
Received: from nm4-vm0.bullet.mail.sp2.yahoo.com (nm4-vm0.bullet.mail.sp2.yahoo.com [98.139.91.190]) by ietfa.amsl.com (Postfix) with ESMTP id 34F8121F860C for <v6ops@ietf.org>; Sun, 28 Oct 2012 13:08:37 -0700 (PDT)
Received: from [98.139.91.66] by nm4.bullet.mail.sp2.yahoo.com with NNFMP; 28 Oct 2012 20:08:33 -0000
Received: from [98.139.91.36] by tm6.bullet.mail.sp2.yahoo.com with NNFMP; 28 Oct 2012 20:08:33 -0000
Received: from [127.0.0.1] by omp1036.mail.sp2.yahoo.com with NNFMP; 28 Oct 2012 20:08:33 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 462202.86923.bm@omp1036.mail.sp2.yahoo.com
Received: (qmail 52649 invoked by uid 60001); 28 Oct 2012 20:08:33 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com.au; s=s1024; t=1351454912; bh=VL5CxffSfIDd1g7wf96dT/c3fuOD1r8iUsgEDChy9uk=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=EULiN9gxXqz2PWxgkXGgGgnA/L2KwuqE8d7DBK6ncGfG4Ok2HCqECT+7t41Jhqx4/aeiySpBYlRFh5IcCD6KRSokmlQRhNeyIyqEqq3pecydXFI2vAWkvxW8q9sWbCbUuyzMHR2lHhl9P76xNNOqL2OeHVsUOjiawTaQ5SJESns=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com.au; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=NPTeCAk3rLBxjk9YyNYAbzyQ6womFi6XQU3yzCsJlARQ7VUFOWZskWrUJiNTT7KjhDMLzSGktgSRLNym8LWZygQYOXbdouCvyv79+eNNqi19jA2ntTNw2iikLXwKwKoNXWsQdOI1lwiLvvzedoHByea+MMaJ7mzXwInb5AA11LQ=;
X-YMail-OSG: hUQdFYAVM1mve3RhQ6UnRZTqPMi29L0bnoE6M8RLOyrcSzj rRaus4d4y.qNXvm_cyBWASqdlgt92_x1UJSlEzKtLactLmSORcTdEVyv2ZtU wVMXHIvM3pYFT3JLsDGMM1B0GPC1fYQJ1RcyuA5K0h2MrCFeLunoyoT63vS7 TCkH3c_ntepJ1RqT3wyRSqJoJQzCZBax5Bttv1UC2.eDiw7pVS_WwRMKyxz9 lgiDzRLhJaFPWSQIxar7mvXuVK98Ic9xvkg1Gqot8iDSK20e_WXaiatUYEzN 8wHSMocboxrs4lZ3YVhq9nuX.EwgWa8gsp0kjPwiKjZeOyH6GD.tM.K5B.v3 FpHoKeuychkiNw9he2ICUZrDlUtNHhWnS3NpKcL.ZeiNTqxwPO2dlAnewdtL wQewr4mWHxgrR4EX4mSWwy056NcQG1MZcbBj.k0pOHk1JBiOTsk4J2nRsF66 YxGlnpp7PeCogT4ClTzg_YvYmup74GeGx4WJnNep6SWt2RuvpijCtIxGUVDg w95_D.hF7Z1eBXRw-
Received: from [150.101.221.237] by web32501.mail.mud.yahoo.com via HTTP; Sun, 28 Oct 2012 13:08:31 PDT
X-Rocket-MIMEInfo: 001.001, SGksCgoKPl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fCj4gRnJvbTogRmVybmFuZG8gR29udCA8ZmdvbnRAc2k2bmV0d29ya3MuY29tPgo.VG86IExvcmVuem8gQ29saXR0aSA8bG9yZW56b0Bnb29nbGUuY29tPiAKPkNjOiBNYXJrIFNtaXRoIDxtYXJrenp6c21pdGhAeWFob28uY29tLmF1PjsgVjYgT3BzIDx2Nm9wc0BpZXRmLm9yZz4gCj5TZW50OiBGcmlkYXksIDI2IE9jdG9iZXIgMjAxMiAxMTo1MSBQTQo.U3ViamVjdDogUmU6IFt2Nm9wc10gbmV3IGRyYWZ0OiBkcmFmdC10YXlsb3ItdjZvcHMBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.123.450
References: <201210161245.q9GCj0i26478@ftpeng-update.cisco.com> <507DA6A3.20807@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF3C3@XCH-NW-01V.nw.nos.boeing.com> <507DAB13.2010704@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF3CE@XCH-NW-01V.nw.nos.boeing.com> <507DDF8A.9010607@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF5AB@XCH-NW-01V.nw.nos.boeing.com> <BB219517-B488-4777-AE9C-35C57BE91263@kumari.net> <Pine.LNX.4.64.1210171337470.7337@shell4.bayarea.net> <AC530E99-4054-4B0A-9B5C-30F9EF4A530C@kumari.net> <20121018223121.28B2C2A0041D@drugs.dv.isc.org> <50812F87.5000107@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DF5C66F@XCH-NW-01V.nw.nos.boeing.com> <5085319B.60707@inex.ie> <CAKD1Yr2qDsM6cCPapRmKuWw7SG-cuMd9PuiBD7ineqj7Bp4+Xw@mail.gmail.com> <8C4093E0-4031-4057-9B96-3738A5A48D2D@merike.com> <1351154487.78754.YahooMailNeo@web32504.mail.mud.yahoo.com> <CAKD1Yr1xDC7BefRyaHHKfw9THRkyQWwHS5P05_uWTOV539uS2w@mail.gmail.com> <508A876F.6070503@si6networks.com>
Message-ID: <1351454911.47361.YahooMailNeo@web32501.mail.mud.yahoo.com>
Date: Sun, 28 Oct 2012 13:08:31 -0700
From: Mark Smith <markzzzsmith@yahoo.com.au>
To: Fernando Gont <fgont@si6networks.com>, Lorenzo Colitti <lorenzo@google.com>
In-Reply-To: <508A876F.6070503@si6networks.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Cc: V6 Ops <v6ops@ietf.org>
Subject: Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Mark Smith <markzzzsmith@yahoo.com.au>
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Oct 2012 20:08:38 -0000

Hi,


>________________________________
> From: Fernando Gont <fgont@si6networks.com>
>To: Lorenzo Colitti <lorenzo@google.com> 
>Cc: Mark Smith <markzzzsmith@yahoo.com.au>; V6 Ops <v6ops@ietf.org> 
>Sent: Friday, 26 October 2012 11:51 PM
>Subject: Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop
> 
>On 10/25/2012 10:53 PM, Lorenzo Colitti wrote:
>> For example, I personally think that fragments are more trouble than
>> they're worth, they don't work in today's Internet (IPv4 *or* IPv6),
>> create security issues (see e.g., Fernando's issues with fragmented RAs,
>> plus an history of security issues in fragment-handling code) and that
>> applications are much better off implementing their own fragmentation
>> above UDP or whatever else they may use. 
>
>I'd mostly say "+1" with everything you've said above.
>

I don't really disagree with that either, it's more that fragmentation is a

current capability of IPv6, so I think the IETF's recommendation should be
that it is enabled by default on the Internet. I think that recommendation
fits the robustness principle too - "..., be liberal in what you accept
from others".

If the IETF recommends against forwarding fragments, then I think that

creates the obligation to provide advice and methods on what do instead,
which might include specifying a standardised UDP fragmentation method,
and provide alternative methods for protocols that utilise IP layer
fragmentation.

Fragments may still be in use, however they may not used much at the

application layer. OSPFv2 and OSPFv3 uses them instead of implementing
it's own fragmentation mechanism (and that may be across multiple hops
in the case of a OSPF virtual link), and they are likely to be commonly
used in IPsec and GRE tunnels (PMTUD across the tunnel path and having
the tunnel MTU adjusted to it is a more advanced capability). My memory
is vague, however I also seem to remember seeing them being sent by load
balancers on the Internet too. At a residential ISP, this was no issue,
as we didn't perform any stateful firewalling at the edge of our network.


I think another thing to bare in mind is a lot of peoples' common approach

of taking a shortcut by just doing what the "experts" say. While
people like us might be interested in the details and pros and cons
of fragmentation, I think a lot of people just want the experts to say
"enable them" or "disable them", so they can move onto working on something
else on their list of things to do. If we don't provide that advice,
then people will default to what they believe is the safe position, and
their safe position is "if in doubt, switch it off". I think this is the
explanation as to why people have disabled all ICMPv4, breaking PMTUD -
they've heard that "ICMP is used by ping, and ping is bad security wise"
(i.e. the topology/host topology argument), so rather than investigating
the details, just universally disable ICMP. As they themselves rarely see
the consequences of PMTUD failing, they think what they've done is fine -
and give that advice to others if they're asked. That approach has propagated
to the point where MSS hacking on all subscribers is necessary in a broadband
scenario if you have a dumbell MTUs situation (i.e. PPPoE between cust LAN and
Internet)


>
>> Unfortunately, it doesn't seem
>> likely that this working group will reach consensus on such a
>> recommendation.
>
>Okay, how about:
>
>Plan A: Try to sense whether we can agree on advice
>Plan B: If we can't, just document the facts
>
>Cheers,
>-- 
>Fernando Gont



Regards,
Mark.