[153257] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IPv6 day and tunnels

daemon@ATHENA.MIT.EDU (Jeroen Massar)
Mon Jun 4 02:42:10 2012

In-Reply-To: <CAAAwwbWqM0PZXVg+wTsuCJgoZjXU444_JZuHfPaMWNRHdJvCNw@mail.gmail.com>
From: Jeroen Massar <jeroen@unfix.org>
Date: Sun, 3 Jun 2012 23:41:24 -0700
To: Jimmy Hess <mysidia@gmail.com>
Cc: North American Networking and Offtopic Gripes List <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 3 Jun 2012, at 23:20, Jimmy Hess <mysidia@gmail.com> wrote:

> On 6/3/12, Jeroen Massar <jeroen@unfix.org> wrote:
>> If one is so stupid to just block ICMP then one should also accept that o=
ne
>> loses functionality.
> ICMP tends to get blocked by firewalls by default

Which firewall product does that?

> ; There are
> legitimate reasons to block ICMP, esp w V6.

The moment one decides to block ICMPv6 you are likely breaking features of I=
Pv6, chose wisely. There are several RFCs pointing out what one could and wh=
at one Must never block. Packet Too Big is a very well known one that one sh=
ould not block.

If you decide to block anyway then well, your problem that your network brea=
ks.

>   Security device
> manufacturers tend to indicate all the  "lost functionality"  is
> optional functionality  not required for a working device.

I suggest that you vote with your money and chose a different vendor if they=
 shove that through your throat. Upgrading braincells is another option thou=
gh ;)

>> If the people in the IETF would have decided to inline the headers that a=
re
>> ICMPv6 into the IPv6 header then there for sure would have been people wh=
o
>> would have blocked the equivalent of PacketTooBig in there too. As long a=
s
>=20
> Over reliance on "PacketTooBig" is a source of the problem;  the idea
> that too large packets should be blindly generated under ordinary
> circumstances, carried many hops, and dropped with an error returned a
> potentially long distance that the sender in each direction is
> expected to see and act upon, at the expense of high latency for both
> peers, during initial connection establishment.

High latency? You do realize that it is only one roundtrip max that might ha=
ppen and that there is no shorter way to inform your side of this situation?=


> Routers don't always know when a packet is too big to reach their next
> hop,  especially in case of Broadcast traffic, =20

You do realize that IPv6 does not have the concept of broadcast do you?! ;)

There is only: unicast, multicast and anycast
(and anycast is just unicast as it is a routing trick)

> so they don't know to
> return a PacketTooBig error, especially  in the case of L2 tunneling
> PPPoE for example,  there may be a L2 bridge on the network in between
> routers with a lower MRU than either of the router's immediate links,
> eg  because PPP, 802.1p,q + MPLS labels, or other overhead are affixed
> to Ethernet frames,  somewhere on the switched path between routers.

If you have a broken L2 network there is nothing that an L3 protocol can do a=
bout it.
Please properly configure it, stuff tend to work better that way.

> The problem is not that "Tunneling is bad";  the problem is  the IP
> protocol has issues.  The protocol should be designed so that there
> will not be issues with tunnelling or different MRU  Ethernet links.

There is no issue as long as you properly respond with PtB and process them w=
hen received.
If your medium is <1280 then your medium has to solve the fragging of packet=
s.

> The real solution is for reverse path MTU (MRU) information to be
> discovered between L3 neighbors by L2 probing,  and discovered MRU
> exchanged using NDP, so routers know the lowest MRU on each directly
> connected interface, then for the worst case reduction in reverse path
> MTU to be included in the routing information  passed via L3 routing
> protocols both IGPs and EGPs  to the next hop.

You do realize that NDP only works on the local link and not further?! ;)

Also, carrying MTU and full routing info to end hosts is definitely not some=
thing a lot of operators would like to do let alone see in their networks. S=
imilar to you not wanting ICMP in your network even though that is the agree=
d upon standard.

> That is, no router should be allowed to enter a route into its
> forwarding table, until the worst case reverse MTU is discovered, to
> reach that network,   with the exception,  that a  device may be
> configured with a default route, and some directly connected networks.

If you want this in your network just configure it everywhere to 1280 and th=
en process and answer PtBs on the edge. Your network, your problem that you w=
ill never use jumbo frames.

> The need for "Too Big"  messages is then restricted to nodes connected
> to terminal networks.  And there should be no such thing as packet
> fragmentation.

The fun thing is though that this Internet thing is quite a bit larger than y=
our imaginary network...

Greets,
 Jeroen



home help back first fref pref prev next nref lref last post