Hi Fred,

2013/6/27 Templin, Fred L <fred.l.temp...@boeing.com>

> Hi,
>
> > a. Tiny fragments (smaller than 1280 bytes) should not be accepted
> (unless they are atomic fragments or > the last fragment of a datagram).
>
> I disagree that all fragments less than 1280 bytes should be classified
> as "tiny fragments". For nested tunnels, for example, the first tunnel
> ingress may wish to fragment to a smaller size (e.g. 1024 bytes) so that
> subsequent tunnel ingresses do not have to fragment further. I think a
> "tiny fragment" is simply an initial fragment that does not include all
> extension headers plus upper layer headers.
>
> On the other hand, SEAL fragments cannot be smaller than 256bytes
> so there is no possible way to create a truly tiny SEAL first fragment.
> SEAL also requires the sender to include all upper layer headers in
> the first fragment unless they absolutely cannot fit due to a size
> restriction.
>


Actually, I was not talking only about SEAL, but generally. If this is the
case, the minimum acceptable size of fragments could be discussed/adjusted
accordingly, but as it is, OS accept as small as 56 bytes fragments!



>
> > b. RFC 5722 should be updated so as only the overlapping fragments to be
> dropped, not all the ones
> > already received, or the ones that follow (as it is the recommendation
> now). This is already
> > implemented by FreeBSD and seems to me the most proper way for handling
> overlapping fragments.
>
> SEAL has a strategy for dealing with overlapping fragments. It would
> be interesting to hear whether it meets your understanding of how best
> to handle overlaps because we can still make changes now if something
> doesn't look right.
>

Again, generally speaking (and not just for SEAL) RFC 5722 "allows" the
abuse of its recommended policy for launching DoS attacks (a single
overlapping fragment will result in discarding a whole datagram). On the
contrary, if  only the overlapping fragment is discarded, at least DoS will
be slightly more difficult.


>
> > We should also never forget that the rest of IPvt6Extension headers can
> result in datagrams much
> > bigger than 1280 bytes, 1500 bytes, or even more. So, if you want to
> deprecate fragmentation in IPv6,
> > you should also deprecate or at least change the extension headers usage
> in IPv6. Which actually means,
> > redesign IPv6.
>
> I agree that excessively-long extension headers are problematic
> in any case - especially if the length of the extension headers
> exceeds the effective path MTU. That needs to be fixed no matter
> what frag/reass scheme is applied.
>
>
I agree

Thank you too

Antonios



> Thanks - Fred
> fred.l.temp...@boeing.com
>
> > Just my 0.02$
>
> Antonios
>
> 2013/6/27 Brian E Carpenter <brian.e.carpen...@gmail.com>
> Cutting to the chase, and assuming that the next version
> will have more analysis and observational evidence, I'm thinking
> something like the following:
>
> 3.  Recommendation
>
>    This memo deprecates IPv6 fragmentation and the IPv6 fragment header.
>    Application and transport layer protocols SHOULD support effective
>    PMTU discovery [RFC4821], since ICMP-based PMTU discovery [RFC1981]
>    is unreliable. Any application or transport layer protocol that
>    cannot support effective PMTU discovery MUST NOT in any circumstances
>    send IPv6 packets that exceed the IPv6 minimum MTU of 1280 bytes.
>
>    IPv6 stacks and forwarding nodes SHOULD continue to support inbound
>    fragmented IPv6 packets as specified in [RFC2460]. However, this
>    requirement exceeds the capability of some types of forwarding node
>    such as firewalls and load balancers. Therefore implementers and
>    operators need to be aware that on many paths through the Internet,
>    IPv6 fragmentation will fail. Legacy applications and transport layer
>    protocols that do not conform to the previous paragraph can expect
>    connectivity failures as a result.
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
>
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to