[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: NDProxy issue



On Fri, 19 Mar 2004, Fred Templin wrote:
> Suppose A and B have performed the initial IPv6 ND exchange,
> with the ND messages proxied by P as per the specification. But,
> suppose also that A and B negotiate IPv6 header compression, i.e.,
> they establish per-hop state that allows headers to be reconstituted
> when immutable parts are omitted over-the-wire. When A sends
> a packet with a compressed IPv6 header that is no larger than the
> MTU of segment (a->p1), but larger than the MTU of segment
> (p2->b), P will be unable to return an ICMPv6 "packet too big".

[...]

> Possible resolutions appear to be: 1) Note the path MTU black
> hole issue, 2) Recommend that IPv6 header compression be
> disabled when an NDProxy may occur along the path, 3) devise
> an alternate scheme for preventing the black holes.

FWIW, it seems obvious that we should do something like 2); Header 
Compression breaks _so_ many other things in the specs that we should 
not be trying to address it here.

Whether or not this deployment scenario is obvious enough (to be a
disallowed one) is probably a matter of opinion.

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings