Re: [v6ops] Prep for v6ops IETF 84 agenda

"Fred Baker (fred)" <fred@cisco.com> Thu, 28 June 2012 23:21 UTC

Return-Path: <fred@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2ADDD11E80D7 for <v6ops@ietfa.amsl.com>; Thu, 28 Jun 2012 16:21:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.274
X-Spam-Level:
X-Spam-Status: No, score=-110.274 tagged_above=-999 required=5 tests=[AWL=-0.275, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VueXTRU0DM82 for <v6ops@ietfa.amsl.com>; Thu, 28 Jun 2012 16:21:04 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) by ietfa.amsl.com (Postfix) with ESMTP id 9D94911E80D3 for <v6ops@ietf.org>; Thu, 28 Jun 2012 16:21:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=fred@cisco.com; l=3382; q=dns/txt; s=iport; t=1340925664; x=1342135264; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=zpQgXkQEUaY3JpBhs9pMRIgIdLhuf8A5TWrnrzwXStU=; b=VyTaMGbDi/TWws0VzNTAP6xhwvyBwOnHhtGdXBtWt4mu6WQXUcTAwR21 U4ha0V5ydoO0S1zi2ZWGGVnVEFLb91vvfFoxJWBomZX6Yxil2QjWMnGAm +3LJhO23Ti8/48UFsiQmreYHzUmje8vXVnmknTx5he4p1aV2RkfUZ9k03 g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av8EALbm7E+tJV2a/2dsb2JhbABFtkSBB4IYAQEBAwEBAQEPASc0CwUHBAIBCBEDAQEBHwkHJwsUCQgCBA4FIodkBQuYJqBbBIs3hSpgA5Uyjh2BZoJf
X-IronPort-AV: E=Sophos;i="4.77,494,1336348800"; d="scan'208";a="97051828"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-5.cisco.com with ESMTP; 28 Jun 2012 23:21:04 +0000
Received: from xhc-rcd-x11.cisco.com (xhc-rcd-x11.cisco.com [173.37.183.85]) by rcdn-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id q5SNL41b010854 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 28 Jun 2012 23:21:04 GMT
Received: from xmb-rcd-x09.cisco.com ([169.254.9.234]) by xhc-rcd-x11.cisco.com ([173.37.183.85]) with mapi id 14.02.0298.004; Thu, 28 Jun 2012 18:21:03 -0500
From: "Fred Baker (fred)" <fred@cisco.com>
To: "Templin, Fred L" <Fred.L.Templin@boeing.com>
Thread-Topic: Prep for v6ops IETF 84 agenda
Thread-Index: AQHNUnbpWFu7FKUfJEyvobkjy/vWXQ==
Date: Thu, 28 Jun 2012 23:21:02 +0000
Message-ID: <C11C2C67-04A6-40DB-888B-3349CB82EB93@cisco.com>
References: <8D73E1D6-A968-4397-A843-FE073197B7F1@cisco.com> <E1829B60731D1740BB7A0626B4FAF0A65D376EDA9D@XCH-NW-01V.nw.nos.boeing.com>
In-Reply-To: <E1829B60731D1740BB7A0626B4FAF0A65D376EDA9D@XCH-NW-01V.nw.nos.boeing.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.21.168.105]
x-tm-as-product-ver: SMEX-10.2.0.1135-7.000.1014-19002.004
x-tm-as-result: No--70.370500-8.000000-31
x-tm-as-user-approved-sender: No
x-tm-as-user-blocked-sender: No
Content-Type: text/plain; charset="us-ascii"
Content-ID: <950004C7AB24A644A87782E747594E45@cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "v6ops@ietf.org WG" <v6ops@ietf.org>, Ron Bonica <ron@bonica.org>
Subject: Re: [v6ops] Prep for v6ops IETF 84 agenda
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jun 2012 23:21:06 -0000

On Jun 29, 2012, at 12:34 AM, Templin, Fred L wrote:

>> -----Original Message-----
>> From: v6ops-bounces@ietf.org [mailto:v6ops-bounces@ietf.org] On Behalf Of
>> Fred Baker (fred)
>> Sent: Sunday, June 24, 2012 7:05 PM
>> To: v6ops@ietf.org WG
>> Cc: Ron Bonica
>> Subject: [v6ops] Prep for v6ops IETF 84 agenda
>> 
>> I sat down this morning to assess our agenda. Interested in working group
>> comment.
> 
> OK Fred; I'll bite. Why are you listing 'draft-generic-v6ops-tunmtu'
> as "#out of charter"?

Because changes to section 4.5 of RFC 2460 ("a source node may divide the packet...") is a change to RFC 2460, and should be discussed by the folks maintaining RFC 2460. 

Begin forwarded message:

> From: "Fred Baker (fred)" <fred@cisco.com>
> Date: June 23, 2012 5:43:22 AM GMT+08:00
> To: Fred Templin <Fred.L.Templin@boeing.com>, "v6ops@ietf.org WG" <v6ops@ietf.org>
> Subject: Re: [v6ops] new draft: draft-generic-v6ops-tunmtu
> 
> Coming back to this as a meta-issue.
> 
> v6ops is about operational considerations and procedures, but not protocols; disputing RFC 2460, aka redesigning IPv6, seems like a protocol issue.
> 
> The reason to not do inner fragmentation, if memory serves, has to do with the behavior of fragmentation in the network and its effect on communications. For example, suppose you and I are in 9K clean networks (so the TCP MSS starts out as 9K), my link to the public network has an MTU of 1500, and somewhere en route to you there is another link with an MTU of 1400. When I send a 9K packet, it will become six 1500 byte packets with a small caboose that picks up the size of five IP headers (IPv4 or IPv6), and what you will receive is six 1400 byte packets interspersed with six 100+IP byte packets, followed by the original caboose. What if the fragmenting router's queue, at the time of fragmentation, was one packet short of the needed capacity? Maybe the retransmission follows a different path and is fragmented differently, resulting in funny overlaps whose handling isn't very well specified. There's nothing *incorrect* about a stream of 13 packets of various sizes being reassem
> bled, but integrating retransmissions gets messy. IIRC, they just wanted to clean that up.
> 
> Which brings me to the following consideration.
> 
> If we're talking about having one tunnel endpoint put a message into a tunnel datagram and then fragment it, and have the other tunnel endpoint reassemble the original and forward it, we are talking about an operational procedure that requires support in a router, but which I can correlate with section 5 of RFC 2460.
> 
> One thing I would invite is discussion of operational experience with RFC 4821. Wouldn't it be nice if the endpoint actually chose an MSS based on what actually worked (shades of Happy Eyeballs), rather than depending on error messages that network operators routinely filter out?
> 
> If we're talking about changing the recommendation of RFC 2460 regarding who does fragmentation, that sounds like an IPv6 protocol change, and I'd like to refer that to 6MAN.
> 
> Does that make sense?
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops