I will take a swing at what I have in mind, run it up the flagpole in 6man, and 
see what happens there.

Thanks - Fred

> -----Original Message-----
> From: Tom Herbert <t...@herbertland.com>
> Sent: Monday, November 27, 2023 1:01 PM
> To: Templin (US), Fred L <fred.l.temp...@boeing.com>
> Cc: int-area <int-area@ietf.org>
> Subject: Re: [EXTERNAL] Re: "Identification Extension for the Internet 
> Protocol" question
> 
> EXT email: be mindful of links/attachments.
> 
> 
> 
> On Mon, Nov 27, 2023 at 12:42 PM Templin (US), Fred L
> <fred.l.temp...@boeing.com> wrote:
> >
> > Tom,
> >
> > > > I think the best way forward would be to simply define a HBH option
> > > > that includes an Identification extension to the standard Fragment
> > > > Header, as per my draft -05:
> > > >
> > > Hi Frad,
> > >
> > > The problem with that is that the correct processing of the Fragment
> > > Header would depend on a HBH option, so that HBH can't be ignored by
> > > the receiving host lest the fragment header is incorrectly processed.
> > > So the HBH option high order bits can't be 00 (skip when unknown).
> >
> > If the source has some sort of operational assurance that the destination 
> > will
> > recognize the HBH option, then it should be OK to include the option even if
> > the high order bits are 00. And, that is plenty good enough for me.
> 
> Fred,
> 
> Unfortunately, that probably wouldn't be good enough for IETF. IP is
> an inherently stateless protocol and receiver processing must be
> correctly done just based on a packet's contents; we can never assume
> that there is external context needed to correctly process IP packets.
> Introducing statefulness into IP makes it a best effort protocol (this
> is the first time someone's suggested this) that might work almost all
> the time-- like maybe 99.999%. But, 99.999% isn't 100% and that is
> enough to say the protocol isn't robust. In practice, at full Internet
> scale, someone, somewhere will inevitably see that some operation
> assurance fails-- when that happens it cannot lead to detrimental
> behaviors. If you can account for all possible behaviors and show that
> there are no detrimental behaviors in the edge condition, then the
> protocol might be considered robust.
> 
> Tom
> 
> >
> > Thanks - Fred
> >
> > > -----Original Message-----
> > > From: Tom Herbert <t...@herbertland.com>
> > > Sent: Monday, November 27, 2023 11:31 AM
> > > To: Templin (US), Fred L <fred.l.temp...@boeing.com>
> > > Cc: int-area <int-area@ietf.org>
> > > Subject: [EXTERNAL] Re: "Identification Extension for the Internet 
> > > Protocol" question
> > >
> > > EXT email: be mindful of links/attachments.
> > >
> > >
> > >
> > > On Mon, Nov 27, 2023 at 9:24 AM Templin (US), Fred L
> > > <fred.l.temp...@boeing.com> wrote:
> > > >
> > > > Hi Tom,
> > > >
> > > > > -----Original Message-----
> > > > > From: Tom Herbert <t...@herbertland.com>
> > > > > Sent: Monday, November 27, 2023 9:00 AM
> > > > > To: Templin (US), Fred L <fred.l.temp...@boeing.com>
> > > > > Cc: int-area <int-area@ietf.org>
> > > > > Subject: Re: "Identification Extension for the Internet Protocol" 
> > > > > question
> > > > >
> > > > > On Mon, Nov 27, 2023 at 8:01 AM Templin (US), Fred L
> > > > > <fred.l.temp...@boeing.com> wrote:
> > > > > >
> > > > > > Hi Tom,
> > > > > >
> > > > > > > -----Original Message-----
> > > > > > > From: Tom Herbert <t...@herbertland.com>
> > > > > > > Sent: Friday, November 24, 2023 11:33 AM
> > > > > > > To: Templin (US), Fred L <fred.l.temp...@boeing.com>
> > > > > > > Cc: int-area <int-area@ietf.org>
> > > > > > > Subject: Re: "Identification Extension for the Internet Protocol" 
> > > > > > > question
> > > > > > >
> > > > > > > On Wed, Nov 22, 2023 at 10:57 AM Templin (US), Fred L
> > > > > > > <fred.l.temp...@boeing.com> wrote:
> > > > > > > >
> > > > > > > > Tom, please have another look at the draft – it gets the job 
> > > > > > > > done without requiring any new kinds of IPv6 extension headers,
> HBH
> > > > > options,
> > > > > > > etc,:
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > https://datatracker.ietf.org/doc/draft-templin-intarea-ipid-ext/
> > > > > > >
> > > > > > > Hi Fred,
> > > > > > >
> > > > > > > From the draft: "For an advanced Identification, this 
> > > > > > > specification
> > > > > > > permits the source to include a second Fragment Header immediately
> > > > > > > following the first such that the two are bonded together to 
> > > > > > > create a
> > > > > > > conceptual IPv6"-- How would this be processed for a legacy 
> > > > > > > receiver
> > > > > > > that doesn't understand these headers are to be bonded?
> > > > > > >
> > > > > > > From the draft: "For the second Fragment Header, only the Next 
> > > > > > > Header
> > > > > > > field is interpreted as a control field that MUST encode the 
> > > > > > > value N
> > > > > > > corresponding to the next header to follow while the remaining 7
> > > > > > > octets are interpreted as an Identification Extension."-- This is
> > > > > > > repurposing fields in a standard protocol header. Even if it
> > > > > > > functionally works, this can break diagnostics and debugging 
> > > > > > > tools in
> > > > > > > deployment.
> > > > > >
> > > > > > How would it be if instead of repurposing the fragmentation control 
> > > > > > fields
> > > > > > in the second Fragment Header we instead make them to be identical 
> > > > > > copies
> > > > > > of the same fields that occurred in the first Fragment Header? 
> > > > > > Then, the
> > > > > > Identification field in the first FH would contain the low-order 4 
> > > > > > octets
> > > > > > while the Identification field in the second FH would contain the
> > > > > > high-order 4 octets of an 8-octet (64-bit) extended Identification,
> > > > > > while the fragmentation control fields are identical? I would 
> > > > > > ideally
> > > > > > like to be able to support Identification extension all the way out 
> > > > > > to
> > > > > > 128bits, but I would be happy with 64bits for now.
> > > > >
> > > > > Hi Fred,
> > > > >
> > > > > I think the question to be asked is what happens if we send two
> > > > > Fragment Headers to a host that is conformant with RFC8200 but unaware
> > > > > of the proposed semantics. I don't believe this would "just work" and
> > > > > probably a receiver would re-assemble the based on the first header
> > > > > resulting in an ill-formed fragment which I suppose would most likely
> > > > > timeout since reassembly wouldn't complete.  Is the behavior
> > > > > deterministic? Are there security ramifications? etc.
> > > >
> > > > OK, I am willing to let this go. It might be worth adding something to 
> > > > an
> > > > "EH limits" draft saying what should be done with IPv6 packets that 
> > > > contain
> > > > more than one Fragment Header - should they simply be dropped, for 
> > > > instance?
> > > >
> > > > > > > IMO, defining a new Hop-by-Hop option for fragmentation still 
> > > > > > > seems
> > > > > > > more palatable.
> > > > > >
> > > > > > This kind of comes back full circle to where this began, where in 
> > > > > > draft versions
> > > > > > -05 and before my original proposal was to use a HBH option for 
> > > > > > Identification
> > > > > > extension maintained separately from the Fragment Header:
> > > > > >
> > > > > > https://datatracker.ietf.org/doc/draft-templin-intarea-ipid-ext/05/
> > > > > >
> > > > > > Are you suggesting to go back to that approach?
> > > > > >
> > > > > > > General comments:
> > > > > > >
> > > > > > > Defining a new Hop-by-Hop option for fragmentation still seems 
> > > > > > > more
> > > > > > > palatable to me.
> > > > > >
> > > > > > Oh, so maybe what you are suggesting is a "full service" HBH option 
> > > > > > that
> > > > > > includes not only the (extended) Identification but also the same 
> > > > > > type of
> > > > > > fragmentation control fields that occur in the Fragment Header? So, 
> > > > > > in
> > > > > > other words, to support the fragmentation operation one would use 
> > > > > > this
> > > > > > new HBH option instead of (and not in addition to) the standard FH? 
> > > > > > If
> > > > > > so, I get the picture but I wonder how it would work. IPv6 extension
> > > > > > header order is:
> > > > > >
> > > > > >       IPv6 header
> > > > > >       Hop-by-Hop Options header
> > > > > >       Destination Options header (note 1)
> > > > > >       Routing header
> > > > > >       Fragment header
> > > > > >       Authentication header (note 2)
> > > > > >       Encapsulating Security Payload header (note 2)
> > > > > >       Destination Options header (note 3)
> > > > > >       Upper-Layer header
> > > > > >
> > > > > > So, if fragmentation controls occurred in the HBH header, wouldn't 
> > > > > > it
> > > > > > foul up any intermediate destinations that may be named in a Routing
> > > > > > Header that follows? Even if we made it as a Destination Option and
> > > > > > not a HBH, the Routing Header still occurs internally to each 
> > > > > > fragment,
> > > > > > right? Can you picture a way to orchestrate the fragmentation and
> > > > > > reassembly processes at the HBH level that would not impede
> > > > > > Routing Header processing? Or, maybe as long as the headers
> > > > > > still appear in the same order as above everything just works out?
> > > > > >
> > > > >
> > > > > Yes, you are correct. Fragmentation in HBH with a Routing Header
> > > > > wouldn't work. Destination options might be the only robust way.
> > > >
> > > > There are two places where Destination Options can occur - immediately
> > > > before the Routing Header (note 1 above) or immediately before the
> > > > Upper-Layer header (note 3 above). The first alternative runs into the
> > > > same problem as for HBH, and the second alternative both requires
> > > > altering Next Header field contents and also occurs after any security
> > > > headers whereas fragmentation should occur before the security
> > > > headers.
> > > >
> > > > I think the best way forward would be to simply define a HBH option
> > > > that includes an Identification extension to the standard Fragment
> > > > Header, as per my draft -05:
> > > >
> > > Hi Frad,
> > >
> > > The problem with that is that the correct processing of the Fragment
> > > Header would depend on a HBH option, so that HBH can't be ignored by
> > > the receiving host lest the fragment header is incorrectly processed.
> > > So the HBH option high order bits can't be 00 (skip when unknown). We
> > > could make the HBH option type 01 to ensure the destination host knows
> > > about the new semantics of the Frag header or drops the packet. The
> > > problem with that is that any router in the path that doesn't
> > > understand the new option could potentially drop the packet. This
> > > doesn't work in Destination Options before the routing header either,
> > > if we set the type to 01 then in DestOpts before the routing header
> > > then intermediate nodes may drop the packet.
> > >
> > > I believe the best chance to add an alternative fragmentation in the
> > > IP layer is to define a new Destination option (not before the routing
> > > header), high order bits 01, contain the real NextHeader value, and
> > > set the DestOpts NextHeader to 47. If the destination host doesn't
> > > recognize the option then it will drop the packet, and if the option
> > > is supported by the destination host then reassembly can occur and the
> > > next header in the reassembled packet following the Destination
> > > Options is from the NextHeader field of the option (in the first
> > > fragment). If any routers in the path attempt to skip over the
> > > Destination options header looking for the transport layer, like they
> > > might do for port filtering, then they won't be able to do anything
> > > with data after the DestOpts since its type is "no next header" (47).
> > >
> > > One problem with this approach is that Auth and ESP header come before
> > > Destination Options in RFC8200 ordering recommendation, we'd really
> > > want the DestOps containing a fragment option to come before them
> > > (like at the same position in recommended ordering as Frag Header). I
> > > don't believe this is a show stopper because the ordering and number
> > > of occurrences of EH are only recommendations in RFC8200,  but there
> > > should be some thought into any potential ramifications if this path
> > > is taken.
> > >
> > > Tom
> > >
> > > > https://datatracker.ietf.org/doc/draft-templin-intarea-ipid-ext/05/
> > > >
> > > > and let fragmentation and reassembly operate at the same levels
> > > > they always have. What do you think?
> > > >
> > > > > > > IMO, it would be better to discuss IPv4 and IPv6 in separate 
> > > > > > > drafts.
> > > > > > > For instance, the changes you're suggesting for IPv6 would be 
> > > > > > > under
> > > > > > > the auspices of 6man. IPv4 changes I suppose fall under int-area. 
> > > > > > > I
> > > > > > > also suspect it's more likely that an extended ID would be 
> > > > > > > accepted
> > > > > > > into IPv6 than IPv4.
> > > > > >
> > > > > > I would not be opposed to splitting the document if it would help
> > > > > > forward progress.
> > > > > >
> > > > > > > Also, I would suggest just focusing on what's needed for a larger
> > > > > > > Fragment Identification to IP; I think there might be an argument 
> > > > > > > to
> > > > > > > be made for that. In particular, I suggest removing discussions or
> > > > > > > references to IP Parcels or OMNI as they don't seem essential to 
> > > > > > > the
> > > > > > > goal of a larger fragment identifier.
> > > > > >
> > > > > > I could see removing the references to IP parcels and OMNI, but I
> > > > > > think we still need to define the new PTB Code values since the
> > > > > > control messaging aspects of what is being proposed are equally
> > > > > > as important as the Identification extension itself. Can we keep at
> > > > > > least that much in a new reduced-scope draft that would go to 6man?
> > > > >
> > > > > Sure, maybe it could be listed some use cases as informative
> > > > > references. It's going to be easier for your readers if a draft like
> > > > > this is self-contained and doesn't require a working knowledge outside
> > > > > of IPv4 or IPv6 protocol.
> > > >
> > > > Maybe a non-normative appendix?
> > > >
> > > > Thank you - Fred
> > > >
> > > > > Tom
> > > > >
> > > > >
> > > > > >
> > > > > > Thank you - Fred
> > > > > >
> > > > > > > Tom
> > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Thank you – Fred
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > From: Templin (US), Fred L 
> > > > > > > > <Fred.L.Templin=40boeing....@dmarc.ietf.org>
> > > > > > > > Sent: Tuesday, November 21, 2023 7:14 PM
> > > > > > > > To: Tom Herbert <t...@herbertland.com>; Templin (US), Fred L 
> > > > > > > > <fred.l.temp...@boeing.com>
> > > > > > > > Cc: int-area <int-area@ietf.org>
> > > > > > > > Subject: RE: [EXTERNAL] Re: "Identification Extension for the 
> > > > > > > > Internet Protocol" question
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Tom,
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > >The bar for creating any new EH is high. If the data needs to 
> > > > > > > > >be read or modified by routers then Hop-by-Hop Options is
> > > appropriate,
> > > > > if
> > > > > > > it's only read at the end host or intermediate nodes then 
> > > > > > > Destination Options should be used.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > The Identification needs to be included in the Per-Fragment 
> > > > > > > > headers, so I guess that means it needs to be “Hop-by-Hop
> Option”,
> > > right?
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Thanks - Fred
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > From: Tom Herbert <t...@herbertland.com>
> > > > > > > > Sent: Tuesday, November 21, 2023 4:22 PM
> > > > > > > > To: Templin (US), Fred L 
> > > > > > > > <Fred.L.Templin=40boeing....@dmarc.ietf.org>
> > > > > > > > Cc: Templin (US), Fred L <fred.l.temp...@boeing.com>; int-area 
> > > > > > > > <int-area@ietf.org>
> > > > > > > > Subject: [EXTERNAL] Re: "Identification Extension for the 
> > > > > > > > Internet Protocol" question
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > EXT email: be mindful of links/attachments.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > On Tue, Nov 21, 2023, 2:45 PM Templin (US), Fred L 
> > > > > > > > <Fred.L.Templin=40boeing....@dmarc.ietf.org> wrote:
> > > > > > > >
> > > > > > > > Tom, I am going to circle back again to where this all started 
> > > > > > > > many draft versions ago. Based on
> > > > > > > >
> > > > > > > > my read of RFC6564 and how that was then taken up in RFC8200, 
> > > > > > > > it looks like the barrier would
> > > > > > > >
> > > > > > > > be very high to specify any new extension header that does not 
> > > > > > > > begin with the two 1-octet
> > > > > > > >
> > > > > > > > fields “Next Header” and “Hdr Ext Len”. The reason for that 
> > > > > > > > specification is to ensure backwards
> > > > > > > >
> > > > > > > > compatibility for widely-deployed hardware in the rare event 
> > > > > > > > that a new extension header would
> > > > > > > >
> > > > > > > > be defined. So, going back to what I said in earlier draft 
> > > > > > > > versions, wouldn’t it be better if we just
> > > > > > > >
> > > > > > > > put the Identification extension in a Hop-by-Hop option instead 
> > > > > > > > of defining a new Fragment
> > > > > > > >
> > > > > > > > Header type?
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Fred,
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > The bar for creating any new EH is high. If the data needs to 
> > > > > > > > be read or modified by routers then Hop-by-Hop Options is
> > > appropriate, if
> > > > > it's
> > > > > > > only read at the end host or intermediate nodes then Destination 
> > > > > > > Options should be used.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Tom
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Fred
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > From: Int-area <int-area-boun...@ietf.org> On Behalf Of Templin 
> > > > > > > > (US), Fred L
> > > > > > > > Sent: Tuesday, November 21, 2023 1:30 PM
> > > > > > > > To: Tom Herbert <tom=40herbertland....@dmarc.ietf.org>
> > > > > > > > Cc: int-area <int-area@ietf.org>
> > > > > > > > Subject: Re: [Int-area] [EXTERNAL] Re: "Identification 
> > > > > > > > Extension for the Internet Protocol" question
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Tom,
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > 4 bytes per packet worth of wasted transmission is a pain point 
> > > > > > > > experienced by all nodes on
> > > > > > > >
> > > > > > > > the local (shared) transmission media as well as along the 
> > > > > > > > networked path – not just for the
> > > > > > > >
> > > > > > > > original source and final destination. Conversely, an odd-sized 
> > > > > > > > roadblock in the middle of a
> > > > > > > >
> > > > > > > > path of otherwise 8-octet-aligned stepping stones is a 
> > > > > > > > processing  anomaly experienced only
> > > > > > > >
> > > > > > > > by the forwarding nodes and end systems on the path. And, how 
> > > > > > > > bad would that be, really?
> > > > > > > >
> > > > > > > > There is currently no hardware logic that recognizes the IPv6 
> > > > > > > > Extended Fragment Header
> > > > > > > >
> > > > > > > > (since it does not yet exist) and software logic can easily be 
> > > > > > > > made to step around an 8-octet
> > > > > > > >
> > > > > > > > alignment anomaly until ASICs begin to emerge that can do it 
> > > > > > > > more efficiently.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > So, I say we bend the rules and make the IPv6 Extended Fragment 
> > > > > > > > Header as the sole
> > > > > > > >
> > > > > > > > exception IPv6 extension header that does not support 8-octet 
> > > > > > > > alignment. All it would
> > > > > > > >
> > > > > > > > take is an update to RFC8200, but we already have to do that in 
> > > > > > > > order to define a new
> > > > > > > >
> > > > > > > > extension header type.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Fred
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > From: Tom Herbert <tom=40herbertland....@dmarc.ietf.org>
> > > > > > > > Sent: Tuesday, November 21, 2023 1:11 PM
> > > > > > > > To: Templin (US), Fred L <fred.l.temp...@boeing.com>
> > > > > > > > Cc: int-area <int-area@ietf.org>
> > > > > > > > Subject: [EXTERNAL] Re: [Int-area] "Identification Extension 
> > > > > > > > for the Internet Protocol" question
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > EXT email: be mindful of links/attachments.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > On Tue, Nov 21, 2023, 12:15 PM Templin (US), Fred L 
> > > > > > > > <Fred.L.Templin=40boeing....@dmarc.ietf.org> wrote:
> > > > > > > >
> > > > > > > > Tom,
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > >The text you quoted says why we can't do that. If a frag 
> > > > > > > > >header length is not a multiple of eight bytes then the 
> > > > > > > > >alignment
> > > > > requirements
> > > > > > > for all subsequent extension headers and the payload are not met. 
> > > > > > > >This potentially breaks a receiving implementation that relies
> on
> > > > > > > alignment.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > I both do and don’t understand why this limitation applies 
> > > > > > > > here. Currently, no IP protocol number exists for the IPv6 
> > > > > > > > Extended
> > > > > Fragment
> > > > > > > Header, so currently no receiving implementations recognize it. 
> > > > > > > So, why can’t we define one special-case IPv6 extension header
> that
> > > > > bends
> > > > > > > the rules? As implementations are deployed to recognize it, they 
> > > > > > > will naturally accommodate the discontinuity in 8-octet aligned
> > > > > extension
> > > > > > > headers.
> > > > > > > >
> > > > > > > > Fred,
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > The problem isn't with the new header, it's the effects on 
> > > > > > > > existing extension headers that might follow it.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > With modern architectures, I would think that saving the 
> > > > > > > > network transmission overhead of 4 wasted octets per message
> would
> > > > > outweigh
> > > > > > > the processing drawbacks in having a discontinuity in 8-octet 
> > > > > > > alignment. Especially since no implementations currently exist.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > 4 bytes is 0.3% of minimum 1280 bytes MTU. I don't believe that 
> > > > > > > > is significant enough savings to diverge from the long
> established
> > > > > > > requirements of the standard.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Tom
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Fred
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > From: Tom Herbert <tom=40herbertland....@dmarc.ietf.org>
> > > > > > > > Sent: Tuesday, November 21, 2023 12:04 PM
> > > > > > > > To: Templin (US), Fred L <fred.l.temp...@boeing.com>
> > > > > > > > Cc: int-area <int-area@ietf.org>
> > > > > > > > Subject: [EXTERNAL] Re: [Int-area] "Identification Extension 
> > > > > > > > for the Internet Protocol" question
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > EXT email: be mindful of links/attachments.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > On Tue, Nov 21, 2023, 11:44 AM Templin (US), Fred L 
> > > > > > > > <Fred.L.Templin=40boeing....@dmarc.ietf.org> wrote:
> > > > > > > >
> > > > > > > > Section 8 of "Identification Extension for the Internet 
> > > > > > > > Protocol" proposes a new IPv6 extension
> > > > > > > > header called the "Extended Fragment Header" that includes a 
> > > > > > > > 96-bit (12 octet) Identification
> > > > > > > > field making the total length of the extension header 128-bits 
> > > > > > > > (16 octets):
> > > > > > > >
> > > > > > > > https://datatracker.ietf.org/doc/draft-templin-intarea-ipid-ext/
> > > > > > > >
> > > > > > > > However, the only reason for the 96-bit Identification field 
> > > > > > > > was to make the whole
> > > > > > > > extension header be an integral multiple of 8 octets - what 
> > > > > > > > would be preferable would
> > > > > > > > be to have only a 64-bit Identification field and limit the 
> > > > > > > > Extended Fragment Header as
> > > > > > > > a whole to 96-bits (12 octets) which is not a multiple of 8 
> > > > > > > > octets.
> > > > > > > >
> > > > > > > > The IPv6 Fragment Header is unique among IPv6 extension headers 
> > > > > > > > in that it does not
> > > > > > > > include a "Hdr Ext Len" field that tells the length of the 
> > > > > > > > header in 8-octet units. This
> > > > > > > > means that implementations must be able to determine its length 
> > > > > > > > (8 octets) solely
> > > > > > > > based on the IP protocol number "44". The proposed IPv6 
> > > > > > > > Extended Fragment Header
> > > > > > > > would likewise not include a "Hdr Ext Len" field and would use 
> > > > > > > > a new IP protocol
> > > > > > > > number to be assigned by IANA, with the IP protocol number 
> > > > > > > > determining the
> > > > > > > > extension header length.
> > > > > > > >
> > > > > > > > RFC8200, Section 4 states:
> > > > > > > >
> > > > > > > >    "Each extension header is an integer multiple of 8 octets 
> > > > > > > > long, in
> > > > > > > >    order to retain 8-octet alignment for subsequent headers."
> > > > > > > >
> > > > > > > > But, can an exception be made for the proposed IPv6 Extended 
> > > > > > > > Fragment Header
> > > > > > > > with a 64-bit Identification field, making the total extension 
> > > > > > > > header length 12 octets
> > > > > > > > which is not a integer multiple of 8?
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Hi Fred,
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > The text you quoted says why we can't do that. If a frag header 
> > > > > > > > length is not a multiple of eight bytes then the alignment
> > > requirements
> > > > > for
> > > > > > > all subsequent extension headers and the payload are not met. 
> > > > > > > This potentially breaks a receiving implementation that relies on
> > > > > alignment.
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Tom
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > Thank you - Fred
> > > > > > > >
> > > > > > > > _______________________________________________
> > > > > > > > Int-area mailing list
> > > > > > > > Int-area@ietf.org
> > > > > > > > https://www.ietf.org/mailman/listinfo/int-area
> > > > > >
> > > >
> >

_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to