Re: [v6ops] I-D Action: draft-vasilenko-v6ops-ipv6-oversized-analysis-01.txt

Brian E Carpenter <brian.e.carpenter@gmail.com> Sat, 18 September 2021 23:28 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 796523A11F6 for <v6ops@ietfa.amsl.com>; Sat, 18 Sep 2021 16:28:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kYd2RXKGTGt8 for <v6ops@ietfa.amsl.com>; Sat, 18 Sep 2021 16:28:45 -0700 (PDT)
Received: from mail-pl1-x62c.google.com (mail-pl1-x62c.google.com [IPv6:2607:f8b0:4864:20::62c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C5BD3A11F5 for <v6ops@ietf.org>; Sat, 18 Sep 2021 16:28:45 -0700 (PDT)
Received: by mail-pl1-x62c.google.com with SMTP id c4so8619790pls.6 for <v6ops@ietf.org>; Sat, 18 Sep 2021 16:28:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=Z6a1O84lSruRqvvHJeRt+LTKFSSscg5m4k08K+IEKlM=; b=XWJzzUzRrGmeIZRlZ+W9qkpLBmzsK3JR3w/tg085cgb3lfyrN9aRs0/ea7VuDVdHoM zg9FQfTWnTUwDo6UD7zj+DtfSS6Qb5I6MzMwMga8G0al05hnSAcnUFe08IP+qGtdJ475 N4VUQPYlmfB8bV2oyIR9324AEJfWvn2vZMiQcAFiz84dhXizU0rHUT+FM+Ix85du47ZJ m/cPtWTQqBnT7oUI5Lm8rMu8sQZv78wZm8m/kEQBnHkwDgzoC279fFSknRm5XGHGLWFx GEZzUoCgqP5eynqeB0MylX0av8OXeV03ZF4uFW+LwpdlxZ2mzyTaId8LvK4zrlBZRJvQ dQoQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=Z6a1O84lSruRqvvHJeRt+LTKFSSscg5m4k08K+IEKlM=; b=T7jVa3WBGyP0nETggKoSWey4DXuHP7H2snaezzd6WrM5XlNx06eupI+1j+s8mnvbmn TxQZastPWpBfDAG6QQMJI7KnHoy/573Lxim3a6VxO3ti0I4hK66aWu4fR+aHBt5wQjKD X12tXOur4v7zCKrCsqymGg0v5B/9cwLrUwIGCcAi7vkeZQ5qU+HzQqowa7BW5y46WlpS nWyKyrMAxi8b0OFVdoMWy6b/UwKmb0uf7uXgmru41p78Sd2tuJnGOtDUbdVmCT84PSwD S08LUJJSliP5VrIqxWMbbyJrXdQgrjLnAyUnMNiRSoKwB41m18j+LNvVKs0guBji3WBc IH7g==
X-Gm-Message-State: AOAM533iirEtBlTJr1/MJh15II479ldHdxFKadcojptcA8+oC0OwLCet J02Y2aYClcDMjoxZ74GDotYLRQ1Vljh9bA==
X-Google-Smtp-Source: ABdhPJwRhuAAQyzIdIQG2cuEYaDbnF9Bt57IDzLXVzA4s4WqI2Ei7C/WnBDJXTEOH1u0UzAJDFYd7w==
X-Received: by 2002:a17:90b:3805:: with SMTP id mq5mr28615212pjb.143.1632007722975; Sat, 18 Sep 2021 16:28:42 -0700 (PDT)
Received: from ?IPv6:2406:e003:11aa:d701:80b2:5c79:2266:e431? ([2406:e003:11aa:d701:80b2:5c79:2266:e431]) by smtp.gmail.com with ESMTPSA id q21sm8719178pjg.55.2021.09.18.16.28.41 for <v6ops@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 18 Sep 2021 16:28:42 -0700 (PDT)
To: v6ops@ietf.org
References: <163195796737.6914.17218865382433079441@ietfa.amsl.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <4fc0b0c1-cdd1-42e7-b9cc-c014a0ab168f@gmail.com>
Date: Sun, 19 Sep 2021 11:28:39 +1200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.10.0
MIME-Version: 1.0
In-Reply-To: <163195796737.6914.17218865382433079441@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/jsKjrefhRDqcJct7TpMl91mtPzU>
Subject: Re: [v6ops] I-D Action: draft-vasilenko-v6ops-ipv6-oversized-analysis-01.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 Sep 2021 23:28:51 -0000

> Abstract
> 
>    The IETF has some initiatives relying on IPv6 Extension Headers
>    added in transit: SRv6, iOAM.


No it doesn't, since this is forbidden by RFC8200.

Does it mean that some mechanisms require IPv6-in-IPv6 encapsulation? If so, the fact that this makes packets bigger is hardly new; it's the original reason for the 1280 byte minimum MTU, so that encapsulated packets will usually fit inside a 1500 byte physical MTU.

1500-1280 = 220, allowing for several levels of encapsulation. As Steve Deering wrote on 13 Nov 1997: "e.g., enough for two layers of secure tunneling including both ESP and AUTH headers."

Obviously, any node that encapsulates an IPv6 packet and sends it on may need to fragment it, as part of the normal sending process (also see RFC4213). There seems to be absolutely nothing new here. At one point the draft says:

   Some standards do propose IPv6 fragmentation (primarily for packets
   1280B and below), but fragmentation is recommended after
   encapsulation.

It isn't "recommended"; it's necessary if, and only if, the PMTU is too small for the packet. But a PMTU below 1280 is not allowed; if the physical MTU is below 1280, an adaptation layer must hide it. 

The draft also says:

   Many standards discussed below ([MPLS Encapsulation], [L2TPv3],
   [VxLAN], [NVO3]) forgot to mention that packets 1280 and below
   should be fragmented.

Firstly, packets of 1280 bytes do not need to be fragmented, because they fit into 1280 bytes.

Secondly, this text confuses the IPv6 sending layer (which fragments per RFC8200 according to the known or assumed PMTU) and the adaptation layer (which fragments and reassembles *at the link layer*, below IPv6, if needed). General IPv6 standards don't mention adaptation layer fragmentation because they don't even see it. IPv6-over-foo documents may need to mention it, if and only if they handle a lower layer whose MTU is less than 1280. A good example is RFC7668 (IPv6 over Bluetooth LE).

Why mention [MPLS Encapsulation] (RFC4023)? It's about MPLS encapsulated in IP, not IP in MPLS. Similarly, [L2TPv3] (RFC3931) and [VxLAN] (RFC7348) are about generic L2 encapsulated in IP, not the other way round. [NVO3] (RFC8926) is different because it mainly concerns IP-in-IP, but it discusses fragmentation in section 4.4.1, specifically stating:

   When determining the MTU size of a tunnel link, the
   maximum length of options MUST be assumed as options may vary on a
   per-packet basis.

(It doesn't need to mention 1280 specifically and in any case, in an NVO3 environment the physical MTU will usually exceed 1500.)

The draft concludes:

   One should upgrade all links to a bigger MTU, if
   possible.

I think most people would agree. We got 1280 because in 1997, 1500 was a hard physical limit on every Ethernet interface. But we are never going to get rid of low-end IoT links with much smaller physical MTUs, needing an adaptation layer to achieve the 1280 byte minimum.

Regards
   Brian

On 18-Sep-21 21:39, internet-drafts@ietf.org wrote:
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> 
> 
>         Title           : IPv6 Oversized Packets Analysis
>         Authors         : Eduard Vasilenko
>                           Xiao Xipeng
>                           Dmitriy Khaustov
> 	Filename        : draft-vasilenko-v6ops-ipv6-oversized-analysis-01.txt
> 	Pages           : 19
> 	Date            : 2021-09-18
> 
> Abstract:
>    The IETF has some initiatives relying on IPv6 Extension Headers
>    added in transit: SRv6, iOAM. Additionally, some recent developments
>    are overlays (SRv6, VxLAN, NVO3, L2TPv3, and LISP). It could create
>    oversized packets that need to be dealt with. This document analyzes
>    available standards for the resolution of oversized packet drops.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-vasilenko-v6ops-ipv6-oversized-analysis/
> 
> There is also an htmlized version available at:
> https://datatracker.ietf.org/doc/html/draft-vasilenko-v6ops-ipv6-oversized-analysis-01
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-vasilenko-v6ops-ipv6-oversized-analysis-01
> 
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> 
> _______________________________________________
> I-D-Announce mailing list
> I-D-Announce@ietf.org
> https://www.ietf.org/mailman/listinfo/i-d-announce
> Internet-Draft directories: http://www.ietf.org/shadow.html
> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>