Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop

Joe Touch <touch@isi.edu> Mon, 29 October 2012 15:09 UTC

Return-Path: <touch@isi.edu>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DEAA421F8674 for <v6ops@ietfa.amsl.com>; Mon, 29 Oct 2012 08:09:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.999
X-Spam-Level:
X-Spam-Status: No, score=-105.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VRUbYvOSb9Cp for <v6ops@ietfa.amsl.com>; Mon, 29 Oct 2012 08:09:44 -0700 (PDT)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) by ietfa.amsl.com (Postfix) with ESMTP id 2E4C121F89B2 for <v6ops@ietf.org>; Mon, 29 Oct 2012 08:09:44 -0700 (PDT)
Received: from [192.168.1.94] (pool-71-105-94-82.lsanca.dsl-w.verizon.net [71.105.94.82]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id q9TF8wjj013057 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 29 Oct 2012 08:09:07 -0700 (PDT)
Message-ID: <508E9C0A.8060004@isi.edu>
Date: Mon, 29 Oct 2012 08:08:58 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20121010 Thunderbird/16.0.1
MIME-Version: 1.0
To: Lorenzo Colitti <lorenzo@google.com>
References: <201210161245.q9GCj0i26478@ftpeng-update.cisco.com> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF3CE@XCH-NW-01V.nw.nos.boeing.com> <507DDF8A.9010607@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF5AB@XCH-NW-01V.nw.nos.boeing.com> <BB219517-B488-4777-AE9C-35C57BE91263@kumari.net> <Pine.LNX.4.64.1210171337470.7337@shell4.bayarea.net> <AC530E99-4054-4B0A-9B5C-30F9EF4A530C@kumari.net> <20121018223121.28B2C2A0041D@drugs.dv.isc.org> <50812F87.5000107@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DF5C66F@XCH-NW-01V.nw.nos.boeing.com> <5085319B.60707@inex.ie> <CAKD1Yr2qDsM6cCPapRmKuWw7SG-cuMd9PuiBD7ineqj7Bp4+Xw@mail.gmail.com> <8C4093E0-4031-4057-9B96-3738A5A48D2D@merike.com> <1351154487.78754.YahooMailNeo@web32504.mail.mud.yahoo.com> <CAKD1Yr1xDC7BefRyaHHKfw9THRkyQWwHS5P05_uWTOV539uS2w@mail.gmail.com> <508A876F.6070503@si6networks.com> <1351454911.47361.YahooMailNeo@web32501.mail.mud.yahoo.com> <CAKD1Yr1CmXV_m4X7Rgdvuj6bXaiaai1rsaosJt5-_m2ChJjgSw@mail.gmail.com>
In-Reply-To: <CAKD1Yr1CmXV_m4X7Rgdvuj6bXaiaai1rsaosJt5-_m2ChJjgSw@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: Fernando Gont <fgont@si6networks.com>, V6 Ops <v6ops@ietf.org>
Subject: Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Oct 2012 15:09:45 -0000

How does that differ substantively from RFC 4821's advice? See esp. Sec. 
8 of that doc, which seems just as accurate for the current situation.

Joe

On 10/28/2012 11:51 PM, Lorenzo Colitti wrote:
> On Mon, Oct 29, 2012 at 5:08 AM, Mark Smith <markzzzsmith@yahoo.com.au
> <mailto:markzzzsmith@yahoo.com.au>> wrote:
>
>     I don't really disagree with that either, it's more that
>     fragmentation is a current capability of IPv6, so I think the IETF's
>     recommendation should be that it is enabled by default on the
>     Internet. I think that recommendation fits the robustness principle
>     too - "..., be liberal in what you accept from others".
>
>     If the IETF recommends against forwarding fragments, then I think
>     that creates the obligation to provide advice and methods on what do
>     instead,
>     which might include specifying a standardised UDP fragmentation
>     method, and provide alternative methods for protocols that utilise
>     IP layer
>     fragmentation.
>
>     Fragments may still be in use, however they may not used much at the
>
>     application layer. OSPFv2 and OSPFv3 uses them instead of
>     implementing it's own fragmentation mechanism (and that may be
>     across multiple hops in the case of a OSPF virtual link), and they
>     are likely to be commonly used in IPsec and GRE tunnels (PMTUD
>     across the tunnel path and having the tunnel MTU adjusted to it is a
>     more advanced capability).
>
>
> Ok, so how about stating the following, then?
>
> 1. Fragments are unreliable on the Internet today.
> 2. If you're an application developer and your apps need to run on the
> Internet, then fragments will likely not work in many cases. If you want
> your application to work in these cases, you should either use
> application-layer fragmentation, use path MTU discovery, or limit
> yourself to small packets instead of sending fragments.
> 3. If you control the network (e.g., if you're the network operator),
> and want to use fragments for tunnels or other purposes, go ahead, but
> note that in other people's networks, they might be filtered.
>
> Your suggestion of providing a generic UDP segmentation mechanism is a
> fine idea, and one that we discussed before this draft was written, but
> our feeling was that such a solution would be impossible to agree on
> until we have a problem statement. This draft ("FYI: some operators
> filter fragments. Keep that in mind.") was supposed to be the problem
> statement.
>
>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>