Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop

Joe Touch <touch@isi.edu> Thu, 25 October 2012 23:52 UTC

Return-Path: <touch@isi.edu>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C41021F88CA for <v6ops@ietfa.amsl.com>; Thu, 25 Oct 2012 16:52:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.481
X-Spam-Level:
X-Spam-Status: No, score=-105.481 tagged_above=-999 required=5 tests=[AWL=1.118, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EzAxra8jD3EZ for <v6ops@ietfa.amsl.com>; Thu, 25 Oct 2012 16:52:04 -0700 (PDT)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) by ietfa.amsl.com (Postfix) with ESMTP id 9F1C821F887E for <v6ops@ietf.org>; Thu, 25 Oct 2012 16:52:04 -0700 (PDT)
Received: from [128.9.160.166] (abc.isi.edu [128.9.160.166]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id q9PNpE3i021311 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 25 Oct 2012 16:51:14 -0700 (PDT)
Message-ID: <5089D072.8000106@isi.edu>
Date: Thu, 25 Oct 2012 16:51:14 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20121010 Thunderbird/16.0.1
MIME-Version: 1.0
To: Andrew Yourtchenko <ayourtch@cisco.com>
References: <201210161245.q9GCj0i26478@ftpeng-update.cisco.com> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF3A2@XCH-NW-01V.nw.nos.boeing.com> <507DA6A3.20807@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF3C3@XCH-NW-01V.nw.nos.boeing.com> <507DAB13.2010704@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF3CE@XCH-NW-01V.nw.nos.boeing.com> <507DDF8A.9010607@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF5AB@XCH-NW-01V.nw.nos.boeing.com> <BB219517-B488-4777-AE9C-35C57BE91263@kumari.net> <Pine.LNX.4.64.1210171337470.7337@shell4.bayarea.net> <AC530E99-4054-4B0A-9B5C-30F9EF4A530C@kumari.net> <20121018223121.28B2C2A0041D@drugs.dv.isc.org> <50812F87.5000107@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DF5C66F@XCH-NW-01V.nw.nos.boeing.com> <5085319B.60707@inex.ie> <CAKD1Yr2qDsM6cCPapRmKuWw7SG-cuMd9PuiBD7ineqj7Bp4+Xw@mail.gmail.com> <8C4093E0-4031-4057-9B96-3738A5A48D2D@merike.com> <alpine.DEB.2.02.1210260056210.15761@ayourtch-lnx>
In-Reply-To: <alpine.DEB.2.02.1210260056210.15761@ayourtch-lnx>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: V6 Ops <v6ops@ietf.org>
Subject: Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Oct 2012 23:52:05 -0000

I'm not sure whether noting the issue is critical or not, but tonly one 
of these examples is useful, IMO, as noted below:

On 10/25/2012 4:30 PM, Andrew Yourtchenko wrote:
...
> +1 on documenting, maybe worth adding to the section 2.2 a few more
> protocol case studies:
>
> http://www.ietf.org/mail-archive/web/ipsec/current/msg07749.html

This one seems useful to the point being discussed (of "drop all" 
fragment cases in the wild).

> http://www.ietf.org/proceedings/71/slides/radext-4.pdf

The above is more about trying to avoid fragmentation than any specific 
reason that fragmentation is a problem. Fragmentation is known to 
increase probability of drop (opportunity for reassembly overload, 
increased exposure to the impact of a packet drop). This example isn't 
directly about "drop all" cases, though.

> http://support.microsoft.com/kb/244474

>From that link:

"Because UDP is a connectionless protocol, fragmented UDP packets will 
be dropped if they arrive at the destination out of order. "

1) because UDP is connectionless, UDP packets should be tolerated out of 
order

2) fragments should already be tolerated out of order

So I can't understand why fragmented UDP packets should be dropped if 
they arrive out of order except as an implementation error.

Is this being noted as "bad advice arising from an implementation 
error"? If not, then it might not be useful to include.

> Alongside with that, also probably something like
> http://tools.ietf.org/html/rfc4347#section-4.2.3 could be also
> referenced as an example of application protocol's approach to
> fragmentation, alongside with
> http://tools.ietf.org/html/draft-smyslov-ipsecme-ikev2-fragmentation-00,
> http://tools.ietf.org/html/draft-perez-radext-radius-fragmentation-03,
>
> This might help future app protocol writers' design choices, even if the
> document does not give the explicit advice (the fact on which I do not
> have an explicit opinion).

That advice presumes that the fragment size can be detected by the 
application; this is sometimes not the case. If such are being noted, 
the it might be useful to also at least recommend PLPMTUD (RFC 4821).

Joe