@Ravij: correct, I am suggesting that the CE and BR MUST forward datagrams with zero checksum. The end-to-end goal is that if IPv4 zero-checksum datagrams go in one end, they pop out as zero-checksum datagrams on the other end.
@Jordan: I’m not sure I quite follow your concern… did I just address it? Michael Overcash Principal Architect, Premises Technology C 678.637.5649 [cid:[email protected]] From: Gottlieb, Jordan J <[email protected]> Sent: Friday, November 4, 2022 1:30 PM To: Rajiv Asati (rajiva) <[email protected]>; Poscic, Kristian (Nokia - US) <[email protected]> Cc: Overcash, Michael (CCI-Atlanta) <[email protected]>; [email protected] Subject: [EXTERNAL] RE: [Softwires] MAP-T issue - UDP packets with zero checksum I think this is going to be very implementation specific and I am in the option that changing to a MUST is too constraining. This is especially true when considering the CE case as stated at the start of the thread. Think QUIC to IPv4-Mapped IPv6 addressed CDN. Even in the BR case (though I do not apply it) I think it is not wise to employ this constraint as there are some possible use cases where this would be impactful. -Jordan From: Rajiv Asati (rajiva) <[email protected]<mailto:[email protected]>> Sent: Friday, November 4, 2022 10:49 AM To: Poscic, Kristian (Nokia - US) <[email protected]<mailto:[email protected]>> Cc: Gottlieb, Jordan J <[email protected]<mailto:[email protected]>>; Overcash, Michael (CCI-Atlanta) <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]> Subject: [EXTERNAL] Re: [Softwires] MAP-T issue - UDP packets with zero checksum CAUTION: The e-mail below is from an external source. Please exercise caution before opening attachments, clicking links, or following guidance. Jordan’s distinction about tunneling vs translation is key here given the considerations for the normative language. Mike’s suggestion is not that BR should calculate checksum, rather that BR should forward packets with UDP checksum being 0. Is that right, Mike? If so, then it is reasonable. Cheers, Rajiv Asati VP.CTO, Cisco “Focus on what we can do with what we have, not the other way around.” On Nov 4, 2022, at 9:19 AM, Poscic, Kristian (Nokia - US) <[email protected]<mailto:[email protected]>> wrote: I agree with Jordan, that it should NOT be made a MUST. In the extreme, someone can use this as attack so that BR does nothing but recalculates checksums. Kris From: Softwires <[email protected]<mailto:[email protected]>> On Behalf Of Gottlieb, Jordan J Sent: Friday, November 4, 2022 11:12 AM To: Overcash, Michael (CCI-Atlanta) <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]> Subject: Re: [Softwires] MAP-T issue - UDP packets with zero checksum Hi all, I just to highlight that RFC6145 (a normative reference to RFC7599) which is obsoleted by RFC7915 covers this in detail. They very appropriately have assigned a SHOULD on the calculation function of zero checksum IPv4 traffic. I also want to point out that rfc6936 addresses tunneling protocol rather than a header translation based softwire and therefore should not be included as any kind of reference to RFC7599. I am very much opposed to making it a MUST as it has significant performance implications on the BR. It makes more sense on the CE for outgoing traffic as it has significant implications for IPv4-mapped IPv6 address traffic. Sincerely, Jordan From: Softwires <[email protected]<mailto:[email protected]>> On Behalf Of Overcash, Michael (CCI-Atlanta) Sent: Friday, November 4, 2022 7:44 AM To: [email protected]<mailto:[email protected]> Subject: [EXTERNAL] [Softwires] MAP-T issue - UDP packets with zero checksum CAUTION: The e-mail below is from an external source. Please exercise caution before opening attachments, clicking links, or following guidance. Hi, IPv4 packets are allowed to have a zero checksum, but IPv6 packets are not. The problem of tunnelling zero checksum IPv4 packets through IPv6 tunnels is described in RFC 6935. Currently RFC 7599 doesn’t address this issue, and as a result we’ve found that some existing BR and CE implementations don’t handle zero checksum UDP IPv4 packets correctly. I think it would be helpful to add RFC 6935 as a normative reference and add a new section 8.5 to discuss the issue. Something like the following would help: 8.5. UDP Checksum Considerations IPv4 UDP packets arriving at the BR or CE are can have a checksum value of zero, indicating no checksum was calculated. Historically, a zero checksum value is not permitted in IPv6 UDP datagrams, and some implementations will discard these packets. The MAP-T CE and BR MUST translate and forward zero checksum UDP datagrams in both the IPv4 and IPv6 domains as described in [RFC6935]. The text above could use some wordsmithing, but hopefully you get the idea. Michael Overcash Principal Architect, Premises Technology C 678.637.5649 <image001.png> _______________________________________________ Softwires mailing list [email protected]<mailto:[email protected]> https://www.ietf.org/mailman/listinfo/softwires<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/softwires__;!!Hit2Ag!wjS6zL7RadF7fHzUCc7H03UenqQsbxtrrJW3EHisODDmXva_L7ZNT4ZqehJVlqqKP_YJY06jSCVqEd_c7WdlXUw1jtsvO8E$>
_______________________________________________ Softwires mailing list [email protected] https://www.ietf.org/mailman/listinfo/softwires
