Hi,

> a. Tiny fragments (smaller than 1280 bytes) should not be accepted (unless 
> they are atomic fragments or > the last fragment of a datagram).

I disagree that all fragments less than 1280 bytes should be classified
as "tiny fragments". For nested tunnels, for example, the first tunnel
ingress may wish to fragment to a smaller size (e.g. 1024 bytes) so that
subsequent tunnel ingresses do not have to fragment further. I think a
"tiny fragment" is simply an initial fragment that does not include all
extension headers plus upper layer headers.

On the other hand, SEAL fragments cannot be smaller than 256bytes
so there is no possible way to create a truly tiny SEAL first fragment.
SEAL also requires the sender to include all upper layer headers in
the first fragment unless they absolutely cannot fit due to a size
restriction.

> b. RFC 5722 should be updated so as only the overlapping fragments to be 
> dropped, not all the ones
> already received, or the ones that follow (as it is the recommendation now). 
> This is already
> implemented by FreeBSD and seems to me the most proper way for handling 
> overlapping fragments.

SEAL has a strategy for dealing with overlapping fragments. It would
be interesting to hear whether it meets your understanding of how best
to handle overlaps because we can still make changes now if something
doesn't look right.

> We should also never forget that the rest of IPvt6Extension headers can 
> result in datagrams much
> bigger than 1280 bytes, 1500 bytes, or even more. So, if you want to 
> deprecate fragmentation in IPv6,
> you should also deprecate or at least change the extension headers usage in 
> IPv6. Which actually means,
> redesign IPv6.

I agree that excessively-long extension headers are problematic
in any case - especially if the length of the extension headers
exceeds the effective path MTU. That needs to be fixed no matter
what frag/reass scheme is applied.

Thanks - Fred
fred.l.temp...@boeing.com
 
> Just my 0.02$

Antonios

2013/6/27 Brian E Carpenter <brian.e.carpen...@gmail.com>
Cutting to the chase, and assuming that the next version
will have more analysis and observational evidence, I'm thinking
something like the following:

3.  Recommendation

   This memo deprecates IPv6 fragmentation and the IPv6 fragment header.
   Application and transport layer protocols SHOULD support effective
   PMTU discovery [RFC4821], since ICMP-based PMTU discovery [RFC1981]
   is unreliable. Any application or transport layer protocol that
   cannot support effective PMTU discovery MUST NOT in any circumstances
   send IPv6 packets that exceed the IPv6 minimum MTU of 1280 bytes.

   IPv6 stacks and forwarding nodes SHOULD continue to support inbound
   fragmented IPv6 packets as specified in [RFC2460]. However, this
   requirement exceeds the capability of some types of forwarding node
   such as firewalls and load balancers. Therefore implementers and
   operators need to be aware that on many paths through the Internet,
   IPv6 fragmentation will fail. Legacy applications and transport layer
   protocols that do not conform to the previous paragraph can expect
   connectivity failures as a result.
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to