On Mon, Nov 27, 2023 at 9:24 AM Templin (US), Fred L
<fred.l.temp...@boeing.com> wrote:
>
> Hi Tom,
>
> > -----Original Message-----
> > From: Tom Herbert <t...@herbertland.com>
> > Sent: Monday, November 27, 2023 9:00 AM
> > To: Templin (US), Fred L <fred.l.temp...@boeing.com>
> > Cc: int-area <int-area@ietf.org>
> > Subject: Re: "Identification Extension for the Internet Protocol" question
> >
> > On Mon, Nov 27, 2023 at 8:01 AM Templin (US), Fred L
> > <fred.l.temp...@boeing.com> wrote:
> > >
> > > Hi Tom,
> > >
> > > > -----Original Message-----
> > > > From: Tom Herbert <t...@herbertland.com>
> > > > Sent: Friday, November 24, 2023 11:33 AM
> > > > To: Templin (US), Fred L <fred.l.temp...@boeing.com>
> > > > Cc: int-area <int-area@ietf.org>
> > > > Subject: Re: "Identification Extension for the Internet Protocol" 
> > > > question
> > > >
> > > > On Wed, Nov 22, 2023 at 10:57 AM Templin (US), Fred L
> > > > <fred.l.temp...@boeing.com> wrote:
> > > > >
> > > > > Tom, please have another look at the draft – it gets the job done 
> > > > > without requiring any new kinds of IPv6 extension headers, HBH
> > options,
> > > > etc,:
> > > > >
> > > > >
> > > > >
> > > > > https://datatracker.ietf.org/doc/draft-templin-intarea-ipid-ext/
> > > >
> > > > Hi Fred,
> > > >
> > > > From the draft: "For an advanced Identification, this specification
> > > > permits the source to include a second Fragment Header immediately
> > > > following the first such that the two are bonded together to create a
> > > > conceptual IPv6"-- How would this be processed for a legacy receiver
> > > > that doesn't understand these headers are to be bonded?
> > > >
> > > > From the draft: "For the second Fragment Header, only the Next Header
> > > > field is interpreted as a control field that MUST encode the value N
> > > > corresponding to the next header to follow while the remaining 7
> > > > octets are interpreted as an Identification Extension."-- This is
> > > > repurposing fields in a standard protocol header. Even if it
> > > > functionally works, this can break diagnostics and debugging tools in
> > > > deployment.
> > >
> > > How would it be if instead of repurposing the fragmentation control fields
> > > in the second Fragment Header we instead make them to be identical copies
> > > of the same fields that occurred in the first Fragment Header? Then, the
> > > Identification field in the first FH would contain the low-order 4 octets
> > > while the Identification field in the second FH would contain the
> > > high-order 4 octets of an 8-octet (64-bit) extended Identification,
> > > while the fragmentation control fields are identical? I would ideally
> > > like to be able to support Identification extension all the way out to
> > > 128bits, but I would be happy with 64bits for now.
> >
> > Hi Fred,
> >
> > I think the question to be asked is what happens if we send two
> > Fragment Headers to a host that is conformant with RFC8200 but unaware
> > of the proposed semantics. I don't believe this would "just work" and
> > probably a receiver would re-assemble the based on the first header
> > resulting in an ill-formed fragment which I suppose would most likely
> > timeout since reassembly wouldn't complete.  Is the behavior
> > deterministic? Are there security ramifications? etc.
>
> OK, I am willing to let this go. It might be worth adding something to an
> "EH limits" draft saying what should be done with IPv6 packets that contain
> more than one Fragment Header - should they simply be dropped, for instance?
>
> > > > IMO, defining a new Hop-by-Hop option for fragmentation still seems
> > > > more palatable.
> > >
> > > This kind of comes back full circle to where this began, where in draft 
> > > versions
> > > -05 and before my original proposal was to use a HBH option for 
> > > Identification
> > > extension maintained separately from the Fragment Header:
> > >
> > > https://datatracker.ietf.org/doc/draft-templin-intarea-ipid-ext/05/
> > >
> > > Are you suggesting to go back to that approach?
> > >
> > > > General comments:
> > > >
> > > > Defining a new Hop-by-Hop option for fragmentation still seems more
> > > > palatable to me.
> > >
> > > Oh, so maybe what you are suggesting is a "full service" HBH option that
> > > includes not only the (extended) Identification but also the same type of
> > > fragmentation control fields that occur in the Fragment Header? So, in
> > > other words, to support the fragmentation operation one would use this
> > > new HBH option instead of (and not in addition to) the standard FH? If
> > > so, I get the picture but I wonder how it would work. IPv6 extension
> > > header order is:
> > >
> > >       IPv6 header
> > >       Hop-by-Hop Options header
> > >       Destination Options header (note 1)
> > >       Routing header
> > >       Fragment header
> > >       Authentication header (note 2)
> > >       Encapsulating Security Payload header (note 2)
> > >       Destination Options header (note 3)
> > >       Upper-Layer header
> > >
> > > So, if fragmentation controls occurred in the HBH header, wouldn't it
> > > foul up any intermediate destinations that may be named in a Routing
> > > Header that follows? Even if we made it as a Destination Option and
> > > not a HBH, the Routing Header still occurs internally to each fragment,
> > > right? Can you picture a way to orchestrate the fragmentation and
> > > reassembly processes at the HBH level that would not impede
> > > Routing Header processing? Or, maybe as long as the headers
> > > still appear in the same order as above everything just works out?
> > >
> >
> > Yes, you are correct. Fragmentation in HBH with a Routing Header
> > wouldn't work. Destination options might be the only robust way.
>
> There are two places where Destination Options can occur - immediately
> before the Routing Header (note 1 above) or immediately before the
> Upper-Layer header (note 3 above). The first alternative runs into the
> same problem as for HBH, and the second alternative both requires
> altering Next Header field contents and also occurs after any security
> headers whereas fragmentation should occur before the security
> headers.
>
> I think the best way forward would be to simply define a HBH option
> that includes an Identification extension to the standard Fragment
> Header, as per my draft -05:
>
Hi Frad,

The problem with that is that the correct processing of the Fragment
Header would depend on a HBH option, so that HBH can't be ignored by
the receiving host lest the fragment header is incorrectly processed.
So the HBH option high order bits can't be 00 (skip when unknown). We
could make the HBH option type 01 to ensure the destination host knows
about the new semantics of the Frag header or drops the packet. The
problem with that is that any router in the path that doesn't
understand the new option could potentially drop the packet. This
doesn't work in Destination Options before the routing header either,
if we set the type to 01 then in DestOpts before the routing header
then intermediate nodes may drop the packet.

I believe the best chance to add an alternative fragmentation in the
IP layer is to define a new Destination option (not before the routing
header), high order bits 01, contain the real NextHeader value, and
set the DestOpts NextHeader to 47. If the destination host doesn't
recognize the option then it will drop the packet, and if the option
is supported by the destination host then reassembly can occur and the
next header in the reassembled packet following the Destination
Options is from the NextHeader field of the option (in the first
fragment). If any routers in the path attempt to skip over the
Destination options header looking for the transport layer, like they
might do for port filtering, then they won't be able to do anything
with data after the DestOpts since its type is "no next header" (47).

One problem with this approach is that Auth and ESP header come before
Destination Options in RFC8200 ordering recommendation, we'd really
want the DestOps containing a fragment option to come before them
(like at the same position in recommended ordering as Frag Header). I
don't believe this is a show stopper because the ordering and number
of occurrences of EH are only recommendations in RFC8200,  but there
should be some thought into any potential ramifications if this path
is taken.

Tom

> https://datatracker.ietf.org/doc/draft-templin-intarea-ipid-ext/05/
>
> and let fragmentation and reassembly operate at the same levels
> they always have. What do you think?
>
> > > > IMO, it would be better to discuss IPv4 and IPv6 in separate drafts.
> > > > For instance, the changes you're suggesting for IPv6 would be under
> > > > the auspices of 6man. IPv4 changes I suppose fall under int-area. I
> > > > also suspect it's more likely that an extended ID would be accepted
> > > > into IPv6 than IPv4.
> > >
> > > I would not be opposed to splitting the document if it would help
> > > forward progress.
> > >
> > > > Also, I would suggest just focusing on what's needed for a larger
> > > > Fragment Identification to IP; I think there might be an argument to
> > > > be made for that. In particular, I suggest removing discussions or
> > > > references to IP Parcels or OMNI as they don't seem essential to the
> > > > goal of a larger fragment identifier.
> > >
> > > I could see removing the references to IP parcels and OMNI, but I
> > > think we still need to define the new PTB Code values since the
> > > control messaging aspects of what is being proposed are equally
> > > as important as the Identification extension itself. Can we keep at
> > > least that much in a new reduced-scope draft that would go to 6man?
> >
> > Sure, maybe it could be listed some use cases as informative
> > references. It's going to be easier for your readers if a draft like
> > this is self-contained and doesn't require a working knowledge outside
> > of IPv4 or IPv6 protocol.
>
> Maybe a non-normative appendix?
>
> Thank you - Fred
>
> > Tom
> >
> >
> > >
> > > Thank you - Fred
> > >
> > > > Tom
> > > >
> > > > >
> > > > >
> > > > >
> > > > > Thank you – Fred
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > From: Templin (US), Fred L 
> > > > > <Fred.L.Templin=40boeing....@dmarc.ietf.org>
> > > > > Sent: Tuesday, November 21, 2023 7:14 PM
> > > > > To: Tom Herbert <t...@herbertland.com>; Templin (US), Fred L 
> > > > > <fred.l.temp...@boeing.com>
> > > > > Cc: int-area <int-area@ietf.org>
> > > > > Subject: RE: [EXTERNAL] Re: "Identification Extension for the 
> > > > > Internet Protocol" question
> > > > >
> > > > >
> > > > >
> > > > > Tom,
> > > > >
> > > > >
> > > > >
> > > > > >The bar for creating any new EH is high. If the data needs to be 
> > > > > >read or modified by routers then Hop-by-Hop Options is appropriate,
> > if
> > > > it's only read at the end host or intermediate nodes then Destination 
> > > > Options should be used.
> > > > >
> > > > >
> > > > >
> > > > > The Identification needs to be included in the Per-Fragment headers, 
> > > > > so I guess that means it needs to be “Hop-by-Hop Option”, right?
> > > > >
> > > > >
> > > > >
> > > > > Thanks - Fred
> > > > >
> > > > >
> > > > >
> > > > > From: Tom Herbert <t...@herbertland.com>
> > > > > Sent: Tuesday, November 21, 2023 4:22 PM
> > > > > To: Templin (US), Fred L <Fred.L.Templin=40boeing....@dmarc.ietf.org>
> > > > > Cc: Templin (US), Fred L <fred.l.temp...@boeing.com>; int-area 
> > > > > <int-area@ietf.org>
> > > > > Subject: [EXTERNAL] Re: "Identification Extension for the Internet 
> > > > > Protocol" question
> > > > >
> > > > >
> > > > >
> > > > > EXT email: be mindful of links/attachments.
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > On Tue, Nov 21, 2023, 2:45 PM Templin (US), Fred L 
> > > > > <Fred.L.Templin=40boeing....@dmarc.ietf.org> wrote:
> > > > >
> > > > > Tom, I am going to circle back again to where this all started many 
> > > > > draft versions ago. Based on
> > > > >
> > > > > my read of RFC6564 and how that was then taken up in RFC8200, it 
> > > > > looks like the barrier would
> > > > >
> > > > > be very high to specify any new extension header that does not begin 
> > > > > with the two 1-octet
> > > > >
> > > > > fields “Next Header” and “Hdr Ext Len”. The reason for that 
> > > > > specification is to ensure backwards
> > > > >
> > > > > compatibility for widely-deployed hardware in the rare event that a 
> > > > > new extension header would
> > > > >
> > > > > be defined. So, going back to what I said in earlier draft versions, 
> > > > > wouldn’t it be better if we just
> > > > >
> > > > > put the Identification extension in a Hop-by-Hop option instead of 
> > > > > defining a new Fragment
> > > > >
> > > > > Header type?
> > > > >
> > > > >
> > > > >
> > > > > Fred,
> > > > >
> > > > >
> > > > >
> > > > > The bar for creating any new EH is high. If the data needs to be read 
> > > > > or modified by routers then Hop-by-Hop Options is appropriate, if
> > it's
> > > > only read at the end host or intermediate nodes then Destination 
> > > > Options should be used.
> > > > >
> > > > >
> > > > >
> > > > > Tom
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > Fred
> > > > >
> > > > >
> > > > >
> > > > > From: Int-area <int-area-boun...@ietf.org> On Behalf Of Templin (US), 
> > > > > Fred L
> > > > > Sent: Tuesday, November 21, 2023 1:30 PM
> > > > > To: Tom Herbert <tom=40herbertland....@dmarc.ietf.org>
> > > > > Cc: int-area <int-area@ietf.org>
> > > > > Subject: Re: [Int-area] [EXTERNAL] Re: "Identification Extension for 
> > > > > the Internet Protocol" question
> > > > >
> > > > >
> > > > >
> > > > > Tom,
> > > > >
> > > > >
> > > > >
> > > > > 4 bytes per packet worth of wasted transmission is a pain point 
> > > > > experienced by all nodes on
> > > > >
> > > > > the local (shared) transmission media as well as along the networked 
> > > > > path – not just for the
> > > > >
> > > > > original source and final destination. Conversely, an odd-sized 
> > > > > roadblock in the middle of a
> > > > >
> > > > > path of otherwise 8-octet-aligned stepping stones is a processing  
> > > > > anomaly experienced only
> > > > >
> > > > > by the forwarding nodes and end systems on the path. And, how bad 
> > > > > would that be, really?
> > > > >
> > > > > There is currently no hardware logic that recognizes the IPv6 
> > > > > Extended Fragment Header
> > > > >
> > > > > (since it does not yet exist) and software logic can easily be made 
> > > > > to step around an 8-octet
> > > > >
> > > > > alignment anomaly until ASICs begin to emerge that can do it more 
> > > > > efficiently.
> > > > >
> > > > >
> > > > >
> > > > > So, I say we bend the rules and make the IPv6 Extended Fragment 
> > > > > Header as the sole
> > > > >
> > > > > exception IPv6 extension header that does not support 8-octet 
> > > > > alignment. All it would
> > > > >
> > > > > take is an update to RFC8200, but we already have to do that in order 
> > > > > to define a new
> > > > >
> > > > > extension header type.
> > > > >
> > > > >
> > > > >
> > > > > Fred
> > > > >
> > > > >
> > > > >
> > > > > From: Tom Herbert <tom=40herbertland....@dmarc.ietf.org>
> > > > > Sent: Tuesday, November 21, 2023 1:11 PM
> > > > > To: Templin (US), Fred L <fred.l.temp...@boeing.com>
> > > > > Cc: int-area <int-area@ietf.org>
> > > > > Subject: [EXTERNAL] Re: [Int-area] "Identification Extension for the 
> > > > > Internet Protocol" question
> > > > >
> > > > >
> > > > >
> > > > > EXT email: be mindful of links/attachments.
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > On Tue, Nov 21, 2023, 12:15 PM Templin (US), Fred L 
> > > > > <Fred.L.Templin=40boeing....@dmarc.ietf.org> wrote:
> > > > >
> > > > > Tom,
> > > > >
> > > > >
> > > > >
> > > > > >The text you quoted says why we can't do that. If a frag header 
> > > > > >length is not a multiple of eight bytes then the alignment
> > requirements
> > > > for all subsequent extension headers and the payload are not met. >This 
> > > > potentially breaks a receiving implementation that relies on
> > > > alignment.
> > > > >
> > > > >
> > > > >
> > > > > I both do and don’t understand why this limitation applies here. 
> > > > > Currently, no IP protocol number exists for the IPv6 Extended
> > Fragment
> > > > Header, so currently no receiving implementations recognize it. So, why 
> > > > can’t we define one special-case IPv6 extension header that
> > bends
> > > > the rules? As implementations are deployed to recognize it, they will 
> > > > naturally accommodate the discontinuity in 8-octet aligned
> > extension
> > > > headers.
> > > > >
> > > > > Fred,
> > > > >
> > > > >
> > > > >
> > > > > The problem isn't with the new header, it's the effects on existing 
> > > > > extension headers that might follow it.
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > With modern architectures, I would think that saving the network 
> > > > > transmission overhead of 4 wasted octets per message would
> > outweigh
> > > > the processing drawbacks in having a discontinuity in 8-octet 
> > > > alignment. Especially since no implementations currently exist.
> > > > >
> > > > >
> > > > >
> > > > > 4 bytes is 0.3% of minimum 1280 bytes MTU. I don't believe that is 
> > > > > significant enough savings to diverge from the long established
> > > > requirements of the standard.
> > > > >
> > > > >
> > > > >
> > > > > Tom
> > > > >
> > > > >
> > > > >
> > > > > Fred
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > From: Tom Herbert <tom=40herbertland....@dmarc.ietf.org>
> > > > > Sent: Tuesday, November 21, 2023 12:04 PM
> > > > > To: Templin (US), Fred L <fred.l.temp...@boeing.com>
> > > > > Cc: int-area <int-area@ietf.org>
> > > > > Subject: [EXTERNAL] Re: [Int-area] "Identification Extension for the 
> > > > > Internet Protocol" question
> > > > >
> > > > >
> > > > >
> > > > > EXT email: be mindful of links/attachments.
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > On Tue, Nov 21, 2023, 11:44 AM Templin (US), Fred L 
> > > > > <Fred.L.Templin=40boeing....@dmarc.ietf.org> wrote:
> > > > >
> > > > > Section 8 of "Identification Extension for the Internet Protocol" 
> > > > > proposes a new IPv6 extension
> > > > > header called the "Extended Fragment Header" that includes a 96-bit 
> > > > > (12 octet) Identification
> > > > > field making the total length of the extension header 128-bits (16 
> > > > > octets):
> > > > >
> > > > > https://datatracker.ietf.org/doc/draft-templin-intarea-ipid-ext/
> > > > >
> > > > > However, the only reason for the 96-bit Identification field was to 
> > > > > make the whole
> > > > > extension header be an integral multiple of 8 octets - what would be 
> > > > > preferable would
> > > > > be to have only a 64-bit Identification field and limit the Extended 
> > > > > Fragment Header as
> > > > > a whole to 96-bits (12 octets) which is not a multiple of 8 octets.
> > > > >
> > > > > The IPv6 Fragment Header is unique among IPv6 extension headers in 
> > > > > that it does not
> > > > > include a "Hdr Ext Len" field that tells the length of the header in 
> > > > > 8-octet units. This
> > > > > means that implementations must be able to determine its length (8 
> > > > > octets) solely
> > > > > based on the IP protocol number "44". The proposed IPv6 Extended 
> > > > > Fragment Header
> > > > > would likewise not include a "Hdr Ext Len" field and would use a new 
> > > > > IP protocol
> > > > > number to be assigned by IANA, with the IP protocol number 
> > > > > determining the
> > > > > extension header length.
> > > > >
> > > > > RFC8200, Section 4 states:
> > > > >
> > > > >    "Each extension header is an integer multiple of 8 octets long, in
> > > > >    order to retain 8-octet alignment for subsequent headers."
> > > > >
> > > > > But, can an exception be made for the proposed IPv6 Extended Fragment 
> > > > > Header
> > > > > with a 64-bit Identification field, making the total extension header 
> > > > > length 12 octets
> > > > > which is not a integer multiple of 8?
> > > > >
> > > > >
> > > > >
> > > > > Hi Fred,
> > > > >
> > > > >
> > > > >
> > > > > The text you quoted says why we can't do that. If a frag header 
> > > > > length is not a multiple of eight bytes then the alignment 
> > > > > requirements
> > for
> > > > all subsequent extension headers and the payload are not met. This 
> > > > potentially breaks a receiving implementation that relies on
> > alignment.
> > > > >
> > > > >
> > > > >
> > > > > Tom
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > Thank you - Fred
> > > > >
> > > > > _______________________________________________
> > > > > Int-area mailing list
> > > > > Int-area@ietf.org
> > > > > https://www.ietf.org/mailman/listinfo/int-area
> > >
>

_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to