Re: [Softwires] IPv6 VPNs configured over 1280 MTU tunnels

"Templin, Fred L" <Fred.L.Templin@boeing.com> Fri, 08 October 2010 18:23 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: softwires@core3.amsl.com
Delivered-To: softwires@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C84A23A6936; Fri, 8 Oct 2010 11:23:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.166
X-Spam-Level:
X-Spam-Status: No, score=-6.166 tagged_above=-999 required=5 tests=[AWL=0.433, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7iYqL9oMKV9Q; Fri, 8 Oct 2010 11:23:25 -0700 (PDT)
Received: from stl-smtpout-01.boeing.com (stl-smtpout-01.boeing.com [130.76.96.56]) by core3.amsl.com (Postfix) with ESMTP id 2F3053A68F1; Fri, 8 Oct 2010 11:23:25 -0700 (PDT)
Received: from slb-av-01.boeing.com (slb-av-01.boeing.com [129.172.13.4]) by stl-smtpout-01.ns.cs.boeing.com (8.14.4/8.14.4/8.14.4/SMTPOUT) with ESMTP id o98IOLma005249 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Fri, 8 Oct 2010 13:24:22 -0500 (CDT)
Received: from slb-av-01.boeing.com (localhost [127.0.0.1]) by slb-av-01.boeing.com (8.14.4/8.14.4/DOWNSTREAM_RELAY) with ESMTP id o98IOLXP029582; Fri, 8 Oct 2010 11:24:21 -0700 (PDT)
Received: from XCH-NWHT-11.nw.nos.boeing.com (xch-nwht-11.nw.nos.boeing.com [130.247.25.114]) by slb-av-01.boeing.com (8.14.4/8.14.4/UPSTREAM_RELAY) with ESMTP id o98IOKKS029567 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=OK); Fri, 8 Oct 2010 11:24:21 -0700 (PDT)
Received: from XCH-NW-01V.nw.nos.boeing.com ([130.247.64.97]) by XCH-NWHT-11.nw.nos.boeing.com ([130.247.25.114]) with mapi; Fri, 8 Oct 2010 11:24:20 -0700
From: "Templin, Fred L" <Fred.L.Templin@boeing.com>
To: Softwires <softwires@ietf.org>, "v4tov6transition@ietf.org" <v4tov6transition@ietf.org>
Date: Fri, 08 Oct 2010 11:24:17 -0700
Thread-Topic: IPv6 VPNs configured over 1280 MTU tunnels
Thread-Index: ActlqdIGu1dYQTloSA6e+ZVmJnpudwAAPoSQAAPsvTMATz16wAAEJ2YgAANlEFA=
Message-ID: <E1829B60731D1740BB7A0626B4FAF0A65C59B794E9@XCH-NW-01V.nw.nos.boeing.com>
References: <E1829B60731D1740BB7A0626B4FAF0A65C59B78DA4@XCH-NW-01V.nw.nos.bo eing.com><C8D29306.3EDBD%yiu_lee@cable.comcast.com><E1829B60731D1740BB7A0626B4FAF0A65C59B79387@XCH-NW-01V.nw.nos.boeing.com> <E1829B60731D1740BB7A0626B4FAF0A65C59B79491@XCH-NW-01V.nw.nos.boeing.com>
In-Reply-To: <E1829B60731D1740BB7A0626B4FAF0A65C59B79491@XCH-NW-01V.nw.nos.boeing.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/mixed; boundary="_002_E1829B60731D1740BB7A0626B4FAF0A65C59B794E9XCHNW01Vnwnos_"
MIME-Version: 1.0
Subject: Re: [Softwires] IPv6 VPNs configured over 1280 MTU tunnels
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/softwires>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Oct 2010 18:23:26 -0000

FYI, here's my tunnel MTU guy that I showed back during
the Vancouver meeting (December 2007)? I think he is
still left with the same conundrum today that he was
back then...

Fred
fred.l.templin@boeing.com

> -----Original Message-----
> From: softwires-bounces@ietf.org 
> [mailto:softwires-bounces@ietf.org] On Behalf Of Templin, Fred L
> Sent: Friday, October 08, 2010 10:18 AM
> To: Softwires; v4tov6transition@ietf.org
> Subject: [Softwires] IPv6 VPNs configured over 1280 MTU tunnels
> 
> End systems in end user networks that connect to the
> IPv6 Internet will likely want to configure IPv6 VPNs,
> e.g., so that they can securely connect to their home
> office networks. Those VPN links must present a 1280
> minimum MTU to upper layers, but if they traverse a
> link in the path with a too-small MTU then the end
> system will see an MTU underrun and will need to use
> IPv6 fragmentation.
> 
> An IPv6-in-IPv4 tunnel with a fixed static 1280 MTU is
> an example of a link in the path that could cause such
> an MTU underrun for end system VPN links. So, should we
> be concerned that tunnels with a fixed 1280 MTU would
> make life difficult for the common operational practice
> of end systems using VPNs?
> 
> Thanks - Fred
> fred.l.templin@boeing.com   
> 
> > -----Original Message-----
> > From: v4tov6transition-bounces@ietf.org 
> > [mailto:v4tov6transition-bounces@ietf.org] On Behalf Of 
> > Templin, Fred L
> > Sent: Friday, October 08, 2010 7:52 AM
> > To: Yiu L. Lee; Brian E Carpenter; Ole Troan
> > Cc: Softwires; v4tov6transition@ietf.org
> > Subject: Re: [v4tov6transition] [Softwires] ISP support of 
> > NativeIPv6across NAT44 CPEs -Proposed 6a44 Specification
> > 
> >  
> > > CPE. This double tunneling tech seems scary.
> > 
> > More to this point about double-tunneling, how were
> > folks thinking that IPv6 VPNs would be run over a
> > 1280 MTU IPv6-in-IPv4 tunnel? That is double-tunneling,
> > and seems like it would be a quite common case, but the
> > MTU seems deficient. Should it use IPv6 fragmentation?
> > 
> > Fred
> > fred.l.templin@boeing.com
> > _______________________________________________
> > v4tov6transition mailing list
> > v4tov6transition@ietf.org
> > https://www.ietf.org/mailman/listinfo/v4tov6transition
> > 
> _______________________________________________
> Softwires mailing list
> Softwires@ietf.org
> https://www.ietf.org/mailman/listinfo/softwires
>