Re: [v6ops] Prep for v6ops IETF 84 agenda

"Fred Baker (fred)" <fred@cisco.com> Tue, 10 July 2012 02:01 UTC

Return-Path: <fred@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 044BE21F85D2 for <v6ops@ietfa.amsl.com>; Mon, 9 Jul 2012 19:01:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.249
X-Spam-Level:
X-Spam-Status: No, score=-110.249 tagged_above=-999 required=5 tests=[AWL=-0.250, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RXVbqwmSzbeg for <v6ops@ietfa.amsl.com>; Mon, 9 Jul 2012 19:01:10 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) by ietfa.amsl.com (Postfix) with ESMTP id A8BC321F85CE for <v6ops@ietf.org>; Mon, 9 Jul 2012 19:01:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=fred@cisco.com; l=4345; q=dns/txt; s=iport; t=1341885697; x=1343095297; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=rO7u12rqZqNhU3WadRWAOGZtXDmpLeFbcrTluZKymhs=; b=Di6/JVlYDViRhexv6dMB3zVpHafiTUbROo0nNZPjNV486KZDPPGHpIYt TN9igteilpFKXu3JLneDePvFYVPBKUIhEZ7v4KtgEsI6xb2SrrhgQNIcX rztvHPEZmt1GZJBzJ0sA/c2T5Jm/Kgvc93SDmoTT78eUDPs3x49NLS+dd I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av8EAJSM+0+tJV2d/2dsb2JhbABFt3yBB4IgAQEBAwEBAQEPASc0CwUHBAIBCBEDAQEBAR4JBycLFAkIAgQOBSKHZQYLnB6gPgSLQIVCYAOVNo4fgWaCXw
X-IronPort-AV: E=Sophos;i="4.77,556,1336348800"; d="scan'208";a="100198054"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-2.cisco.com with ESMTP; 10 Jul 2012 02:01:36 +0000
Received: from xhc-rcd-x11.cisco.com (xhc-rcd-x11.cisco.com [173.37.183.85]) by rcdn-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id q6A21ajN007064 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 10 Jul 2012 02:01:36 GMT
Received: from xmb-rcd-x09.cisco.com ([169.254.9.118]) by xhc-rcd-x11.cisco.com ([173.37.183.85]) with mapi id 14.02.0298.004; Mon, 9 Jul 2012 21:01:36 -0500
From: "Fred Baker (fred)" <fred@cisco.com>
To: "Templin, Fred L" <Fred.L.Templin@boeing.com>
Thread-Topic: Prep for v6ops IETF 84 agenda
Thread-Index: AQHNUnbpWFu7FKUfJEyvobkjy/vWXQ==
Date: Tue, 10 Jul 2012 02:01:13 +0000
Message-ID: <57B96402-FB12-4579-9731-BDD7FC89C9D3@cisco.com>
References: <8D73E1D6-A968-4397-A843-FE073197B7F1@cisco.com> <E1829B60731D1740BB7A0626B4FAF0A65D376EDA9D@XCH-NW-01V.nw.nos.boeing.com> <C11C2C67-04A6-40DB-888B-3349CB82EB93@cisco.com> <E1829B60731D1740BB7A0626B4FAF0A65D8F24CE9D@XCH-NW-01V.nw.nos.boeing.com>
In-Reply-To: <E1829B60731D1740BB7A0626B4FAF0A65D8F24CE9D@XCH-NW-01V.nw.nos.boeing.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.21.85.176]
x-tm-as-product-ver: SMEX-10.2.0.1135-7.000.1014-19030.000
x-tm-as-result: No--75.609400-8.000000-31
x-tm-as-user-approved-sender: No
x-tm-as-user-blocked-sender: No
Content-Type: text/plain; charset="us-ascii"
Content-ID: <C7EB4A4B26317D4285CCB130CE1CA775@cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "v6ops@ietf.org WG" <v6ops@ietf.org>, Ron Bonica <ron@bonica.org>
Subject: Re: [v6ops] Prep for v6ops IETF 84 agenda
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2012 02:01:12 -0000

No problem. Same rules apply as to all drafts; Joel and I will be looking for operational interest from the working group.

On Jul 9, 2012, at 5:07 PM, Templin, Fred L wrote:

> Hi Fred,
> 
>> -----Original Message-----
>> From: Fred Baker (fred) [mailto:fred@cisco.com]
>> Sent: Thursday, June 28, 2012 4:21 PM
>> To: Templin, Fred L
>> Cc: v6ops@ietf.org WG; Ron Bonica
>> Subject: Re: Prep for v6ops IETF 84 agenda
>> 
>> 
>> On Jun 29, 2012, at 12:34 AM, Templin, Fred L wrote:
>> 
>>>> -----Original Message-----
>>>> From: v6ops-bounces@ietf.org [mailto:v6ops-bounces@ietf.org] On Behalf
>> Of
>>>> Fred Baker (fred)
>>>> Sent: Sunday, June 24, 2012 7:05 PM
>>>> To: v6ops@ietf.org WG
>>>> Cc: Ron Bonica
>>>> Subject: [v6ops] Prep for v6ops IETF 84 agenda
>>>> 
>>>> I sat down this morning to assess our agenda. Interested in working
>> group
>>>> comment.
>>> 
>>> OK Fred; I'll bite. Why are you listing 'draft-generic-v6ops-tunmtu'
>>> as "#out of charter"?
>> 
>> Because changes to section 4.5 of RFC 2460 ("a source node may divide the
>> packet...") is a change to RFC 2460, and should be discussed by the folks
>> maintaining RFC 2460.
> 
> This document has now been revised to speak only to
> operational issues (and not any changes to RFC2460
> nor any other documents):
> 
> https://datatracker.ietf.org/doc/draft-generic-v6ops-tunmtu/
> 
> Please re-review and re-evaluate in terms of charter
> applicability.
> 
> Thanks - Fred
> fred.l.templin@boeing.com
> 
>> Begin forwarded message:
>> 
>>> From: "Fred Baker (fred)" <fred@cisco.com>
>>> Date: June 23, 2012 5:43:22 AM GMT+08:00
>>> To: Fred Templin <Fred.L.Templin@boeing.com>, "v6ops@ietf.org WG"
>> <v6ops@ietf.org>
>>> Subject: Re: [v6ops] new draft: draft-generic-v6ops-tunmtu
>>> 
>>> Coming back to this as a meta-issue.
>>> 
>>> v6ops is about operational considerations and procedures, but not
>> protocols; disputing RFC 2460, aka redesigning IPv6, seems like a protocol
>> issue.
>>> 
>>> The reason to not do inner fragmentation, if memory serves, has to do
>> with the behavior of fragmentation in the network and its effect on
>> communications. For example, suppose you and I are in 9K clean networks
>> (so the TCP MSS starts out as 9K), my link to the public network has an
>> MTU of 1500, and somewhere en route to you there is another link with an
>> MTU of 1400. When I send a 9K packet, it will become six 1500 byte packets
>> with a small caboose that picks up the size of five IP headers (IPv4 or
>> IPv6), and what you will receive is six 1400 byte packets interspersed
>> with six 100+IP byte packets, followed by the original caboose. What if
>> the fragmenting router's queue, at the time of fragmentation, was one
>> packet short of the needed capacity? Maybe the retransmission follows a
>> different path and is fragmented differently, resulting in funny overlaps
>> whose handling isn't very well specified. There's nothing *incorrect*
>> about a stream of 13 packets of various sizes being reassem
>>> bled, but integrating retransmissions gets messy. IIRC, they just wanted
>> to clean that up.
>>> 
>>> Which brings me to the following consideration.
>>> 
>>> If we're talking about having one tunnel endpoint put a message into a
>> tunnel datagram and then fragment it, and have the other tunnel endpoint
>> reassemble the original and forward it, we are talking about an
>> operational procedure that requires support in a router, but which I can
>> correlate with section 5 of RFC 2460.
>>> 
>>> One thing I would invite is discussion of operational experience with
>> RFC 4821. Wouldn't it be nice if the endpoint actually chose an MSS based
>> on what actually worked (shades of Happy Eyeballs), rather than depending
>> on error messages that network operators routinely filter out?
>>> 
>>> If we're talking about changing the recommendation of RFC 2460 regarding
>> who does fragmentation, that sounds like an IPv6 protocol change, and I'd
>> like to refer that to 6MAN.
>>> 
>>> Does that make sense?
>>> _______________________________________________
>>> v6ops mailing list
>>> v6ops@ietf.org
>>> https://www.ietf.org/mailman/listinfo/v6ops
>