In message <2134f8430051b64f815c691a62d983180e1...@xch-blv-504.nw.nos.boeing.co m>, "Templin, Fred L" writes: > Hi Mark, > > > -----Original Message----- > > From: Mark Andrews [mailto:[email protected]] > > Sent: Tuesday, August 06, 2013 7:32 PM > > To: Templin, Fred L > > Cc: Doug Barton; [email protected] > > Subject: Re: UDP+Fragmentation > >=20 > >=20 > > In message <2134F8430051B64F815C691A62D983180E0E2C@XCH-BLV- > > 504.nw.nos.boeing.com>, "Templin, Fred L" writes: > > > > On 08/06/2013 03:07 PM, Templin, Fred L wrote: > > > > > If we are going to define a new protocol type, let's define one > > > > > that addresses everything we are currently struggling with and > > > > > has the extensibility to address additional requirements moving > > > > > forward into the future. > > > > > > > > So in other words let's make all the same mistakes we made with the > > > > design of IPv6? :) > > > > > > Not even. This is about fixing and atoning for mistakes; not > > > introducing new ones. > > > > > > Thanks - Fred > > > [email protected] > > > -------------------------------------------------------------------- > > > IETF IPv6 working group mailing list > > > [email protected] > > > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 > > > -------------------------------------------------------------------- > >=20 > > There are several issues with getting fragments through firewalls. > > My draft addresses one of them. > >=20 > > Putting all the headers into the initial fragment is another part > > of fix / reducing the issue. If you don't do something like that > > firewall will drop initial fragments because that can't be expected > > to reassemble unless they are doing DPI. > >=20 > > Making fragment sizes more even is yet another part of the issue. > >=20 > > Allowing tunnel entry points to re-fragment fragments is yet another > > part of the solution space. > > In these points, you are making a good case for SEAL.
And all those changes are independent of a SEAL header. They are changes to the fragmentation algorithm. SEAL has a big drawback. SEAL requires then tunnel endpoint / destination node to understand SEAL. My draft does not require any other node to understand the option. You can start sending packets with the option immediately and they should be passed by nodes that are not aware of what it does. Destination nodes can process the fragments without knowning the contents. This is no more dangerous than processing fragmented traffic without the option if you are already passing fragments. The key difference is HEADER vs OPTION. Mark > Thanks - Fred > [email protected] > > > Mark > > -- > > Mark Andrews, ISC > > 1 Seymour St., Dundas Valley, NSW 2117, Australia > > PHONE: +61 2 9871 4742 INTERNET: [email protected] -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: [email protected] -------------------------------------------------------------------- IETF IPv6 working group mailing list [email protected] Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------
