Bob, 

On 2019-09-03 14:08, Bob Hinden wrote:

> Joe,
> 
>> On Aug 30, 2019, at 4:36 PM, Joe Touch <[email protected]> wrote:
>> 
>> Hi, all,
>> 
>> I disagree with the changes indicated in this version.
>> 
>> The new text is both incorrect does not IMO reflect WG consensus.
>> 
>> It is simply false that "it WILL break" or "new protocols can't possibly 
>> know whether fragmentation works" - you even cite studies where this works 
>> the majority of the time (failing 37% for IPv6 DNS resolvers is succeeding 
>> 63%). This is not the same as ICMP-based MTU discovery. Users absolutely can 
>> test and know this.
>> 
>> I repeat my previous suggestion with caps for emphasis- that, LIKE ALL 
>> PROTOCOLS AND FEATURES IN THE INTERNET, IP fragmentation is not guaranteed 
>> to work on any given path and should be confirmed before being relied upon.
> 
> The relevant text in -16 is:
> 
> 6.1.  For Application and Protocol Developers
> 
> Developers SHOULD NOT develop new protocols or applications that rely
> on IP fragmentation.  When a new protocol or application is deployed
> in an environment that does not fully support IP fragmentation, it
> SHOULD operate correctly, either in its default configuration or in a
> specified alternative configuration.
> 
> While there may be controlled environments where IP fragmentation
> works reliably, this is a deployment issue and can not be known to
> someone developing a new protocol or application.  It is not
> recommended that new protocols or applications be developed that rely
> on IP fragmentation.  Protocols and applications that rely on IP
> fragmentation will fail to work on the Internet.
> 
> The text in the first paragraph is unchanged in this version of the draft and 
> has been there for awhile.  The recommendation is still SHOULD NOT.   This 
> does allow other usage if there is a good reason to do so.
> 
> The new second paragraph (written to resolve the DISCUSS comment) attempts to 
> discuss the the controlled environment case. It clearly states it is a 
> recommendation (along the lines of the SHOULD NOT) in the first paragraph and 
> explains why.

It drops the idea that this is allowed - and is factually incorrect. 

First, this absolutely can be known to deployers. This is not like
silent ICMP too-big drops where the cause of the drop cannot be known. 

Second, it's already widely deployed to deal with IP-IP tunnels. 

> Note, personally I think, citing your case of failing 37% of the time, is 
> consistent with "will fail to work on the Internet".

Failing 37% of the endpoints is not the same as failing 37% of the time.
And no, neither one is consistent with "will fail on the Internet". If
you think 37% = will fail, then I'll open a personal casino for you with
those odds for you to win... 

> Also, isn't this the reason why this draft exists, that is fragmentation is 
> fragile.

There are differences of opinion even within the WG as to why this draft
exists. I would believe the authors believe as you state, but others of
us believe that "implementations are buggy" is more the take-home. The
WG and IETF last calls tried to strike a balance that this change
undoes. 

This is not respecting the view of the WG or IETF. 

Joe
_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to