[v6ops] I-D Action: draft-ietf-v6ops-ipv6-ehs-packet-drops-00 - MTU issue

Vasilenko Eduard <vasilenko.eduard@huawei.com> Sat, 01 August 2020 17:00 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id F11993A0ACD for <v6ops@ietfa.amsl.com>; Sat, 1 Aug 2020 10:00:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id cEdTOuOPpchw for <v6ops@ietfa.amsl.com>; Sat, 1 Aug 2020 10:00:56 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9103A3A0A73 for <v6ops@ietf.org>; Sat, 1 Aug 2020 10:00:56 -0700 (PDT)
Received: from lhreml743-chm.china.huawei.com (unknown []) by Forcepoint Email with ESMTP id 83F0740720A1BA1FCA9C; Sat, 1 Aug 2020 17:45:50 +0100 (IST)
Received: from msceml702-chm.china.huawei.com ( by lhreml743-chm.china.huawei.com ( with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Sat, 1 Aug 2020 17:45:50 +0100
Received: from msceml703-chm.china.huawei.com ( by msceml702-chm.china.huawei.com ( with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Sat, 1 Aug 2020 19:45:49 +0300
Received: from msceml703-chm.china.huawei.com ([]) by msceml703-chm.china.huawei.com ([]) with mapi id 15.01.1913.007; Sat, 1 Aug 2020 19:45:49 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: "v6ops@ietf.org" <v6ops@ietf.org>, Fernando Gont <fgont@si6networks.com>
Thread-Topic: [v6ops] I-D Action: draft-ietf-v6ops-ipv6-ehs-packet-drops-00 - MTU issue
Thread-Index: AdZoGT3eJjIdKvfMQSCxNFAVWXOVyg==
Date: Sat, 1 Aug 2020 16:45:49 +0000
Message-ID: <5c74b8bd3063471d88add4b004390628@huawei.com>
Accept-Language: en-US
Content-Language: en-US
x-originating-ip: []
Content-Type: text/plain; charset="koi8-r"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/gCg9IbfAVe2QoPAhfXmFl71iUPk>
Subject: [v6ops] I-D Action: draft-ietf-v6ops-ipv6-ehs-packet-drops-00 - MTU issue
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Aug 2020 17:00:59 -0000

Hi all,
There is informative reference to MTU problem (PMTUD-Blackholes),
but nothing about MTU is mentioned in the draft itself.
I believe that MTU is among reasons for EHs packet drops,
but Fernando's statistics does not separate discard from:
- PFE restrictions
- Configured policies
- oversized MTU
Hence, we could make only qualitative statement.

Is it possible to extract MTU drop weight from your numerous tests?
ICMP code for oversized packet was different.
Do you keep raw answers?

-----Original Message-----
From: v6ops [mailto:v6ops-bounces@ietf.org] On Behalf Of internet-drafts@ietf.org
Sent: 31 июля 2020 г. 22:32
To: i-d-announce@ietf.org
Cc: v6ops@ietf.org
Subject: [v6ops] I-D Action: draft-ietf-v6ops-ipv6-ehs-packet-drops-00.txt

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IPv6 Operations WG of the IETF.

        Title           : Operational Implications of IPv6 Packets with Extension Headers
        Authors         : Fernando Gont
                          Nick Hilliard
                          Gert Doering
                          Warren Kumari
                          Geoff Huston
                          Will (Shucheng) Liu
	Filename        : draft-ietf-v6ops-ipv6-ehs-packet-drops-00.txt
	Pages           : 16
	Date            : 2020-07-31

   This document summarizes the operational implications of IPv6
   extension headers, and attempts to analyze reasons why packets with
   IPv6 extension headers may be dropped in the public Internet.

The IETF datatracker status page for this draft is:

There are also htmlized versions available at:

Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:

v6ops mailing list