[165251] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IP Fragmentation - Not reliable over the Internet?

daemon@ATHENA.MIT.EDU (William Herrin)
Tue Aug 27 13:46:33 2013

In-Reply-To: <6e53114d968f40f097a83640d90f9acf@BN1PR03MB171.namprd03.prod.outlook.com>
From: William Herrin <bill@herrin.us>
Date: Tue, 27 Aug 2013 13:45:02 -0400
To: Christopher Palmer <Christopher.Palmer@microsoft.com>
Cc: North American Network Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Mon, Aug 26, 2013 at 8:01 PM, Christopher Palmer
<Christopher.Palmer@microsoft.com> wrote:
> What is the probability that a random path between two Internet
> hosts will traverse a middlebox that drops or otherwise barfs on
> fragmented IPv4 packets?

Hi Christopher,

I think there might be three rather different questions here:

1. If I originate IP packet fragments, such as an 8000 byte NFS packet
broken into 1500 byte fragments, what's the probability of some host
before the other endpoint dropping one or all of those fragments?

2. If I send an IP packet that's too large for the path and *don't*
set the don't-fragment bit, what' the chance that the router with the
too-small next hop will fail to correctly fragment that packet (or
that the correctly fragmented packet will fall into trap #1 above)?

3. If I send an IP packet that's too large for the path and *do* set
the don't-fragment bit, what's the chance of failing to receive the
"packet too big" message it causes the intermediate router to send?

Are you after the answer to one in particular?

Regards,
Bill Herrin



-- 
William D. Herrin ................ herrin@dirtside.com  bill@herrin.us
3005 Crane Dr. ...................... Web: <http://bill.herrin.us/>
Falls Church, VA 22042-3004


home help back first fref pref prev next nref lref last post