[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: draft-ietf-v6ops-mech-v2-00.txt



Erik Nordmark wrote:
The recent changes (copied from the document):
 -    Clarified that the dynamic path MTU mechanism in section 3.2 is
      OPTIONAL but if it is implemented it should follow the rules in
      section 3.2.

This method is susceptible to black holes (see RFC 2923).

Yes, if ICMPv4 "too big" packets are blocked by firewalls between
the encapsulator and decapsulator.
Yes. Also at issue are spoofed ICMPv4 "fragmentation needed" packets
as a form of denial of service, and forwarding nodes that do not
generate ICMPv4 "frag needed"'s at all.

It definitely makes sure additing warnings about this in the spec.
OK.

 -    Stated that implementations MAY have a knob by which the MTU can
      be set to larger values on a tunnel by tunnel basis, but that
      the default MUST be 1280 and that decapsulators need to be
      configured to match the encapsulaltor's MTU.

This method should only be used when care is taken to avoid harmful levels of
fragmentation in the network (please see my previous note on this subject). This
needs to be clarified in the draft.

I can add warnings about this in the draft.
Better than warnings are mechanisms that would allow the encapsulator
to efficiently probe/monitor the path MTU to the decapsulator. See:

  http://www.geocities.com/osprey67/isatap-pre13.txt
  http://www.ietf.org/internet-drafts/draft-templin-ndiscmtu-00.txt

Fred
ftemplin@iprg.nokia.com