In message <CAKr6gn2zu2n-pJMirG-seN5WX=evyquu9eqqlov-zf-rkq9...@mail.gmail.com>
, George Michaelson writes:
> --===============4023034923616370839==
> Content-Type: multipart/alternative; boundary=047d7b86e55011538004dff06308
> 
> --047d7b86e55011538004dff06308
> Content-Type: text/plain; charset=ISO-8859-1
> 
> On Tue, Jun 25, 2013 at 2:38 AM, Ronald Bonica <[email protected]> wrote:
> 
> >    ** **
> >
> > I'd like to understand the basis of these assertions. I believe what I am
> > seeing, on the edge, suggests there is in fact V6 fragmentation in both TCP
> > and UDP.****
> >
> > ** **
> >
> > ** **
> >
> > Hi George,****
> >
> > ** **
> >
> > It would be helpful if you could describe:****
> >
> > ** **
> >
> > **-          **Where your observations are being made
> >
> 
> On our own web services (www.apnic.net, and an associated whois service
> which attracts more wide ranging traffic)
> 
> On 'high in the tree' DNS servers for reverse DNS, including an NS of
> in-addr.arpa and ip6.arpa (note: dns transport is disjoint from the
> namespace being searched: we see queries over v6 transport to v4 domains,
> and to ccTLD we secondary)
> 
> In a packet capture of 2400::/12 run in conjunction with Merit, as research
> into darknets.
> 
> 
> > ****
> >
> > **-          **What percentage of traffic is fragmented
> >
> 
> our own web: practically none.
> 
> our own dns: 0.01%. in a sequence of 10 minute samples. consistently, I
> might add.
> 
> the 2400::/12:  around 0.25% to 1%. so more variable, but higher.
> 
> 
> > ****
> >
> > **-          **What kinds of packets are being fragmented
> >
> 
> our own DNS: port 53. little TCP.
> 
> 2400::/12 capture. mostly port 53. TCP doesn't get captured in the darknet
> research. Its impossible to establish the end-to-end relationship.
> 
> I am not sure I call up to 1% of something 'rare'. I'm not even sure I call
> 0.1% or 0.01% of something 'rare'. Otherwise, Since IPv6 adoption rates are
> at this class of deployment by end user, perhaps it also should be
> considered for deprecation..
> 
> It really would be helpful to understand your assertion about the rarity of
> IPv6 fragmentation. I want to understand how you got to this point of view
> on IPv6 frags.
> 
> -George

.58% of my IPv6 traffic in fragmented.  Assuming that it is mostly UDP I
get 14% of my IPv6 UDP traffic is fragmented.  Most of that traffic
is non local.  I would assume most of the drops are due to PMTUD
blocking the initial fragment but letting the tail fragment through
as this machine is behind a tunnel.

Mark

ip6:
        381915 total packets received
        0 with size smaller than minimum
        0 with data size < data length
        0 with bad options
        0 with incorrect version number
        2213 fragments received
        0 fragments dropped (dup or out of space)
        48 fragments dropped after timeout
        0 fragments that exceeded limit
        1077 packets reassembled ok
        217810 packets for this host
        0 packets forwarded
        93958 packets not forwardable
        0 redirects sent
        297719 packets sent from this host
        0 packets sent with fabricated ip header
        0 output packets dropped due to no bufs, etc.
        5031 output packets discarded due to no route
        33 output datagrams fragmented
        66 fragments created
        0 datagrams that can't be fragmented
        0 packets that violated scope rules
        93924 multicast packets which we don't join
        Input histogram:
                hop by hop: 132
                TCP: 202894
                UDP: 15103
                fragment: 2213
                ICMP6: 161573

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: [email protected]
--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to