Skip to main content

IPv6 and UDP Checksums for Tunneled Packets
draft-ietf-6man-udpchecksums-08

Revision differences

Document history

Date Rev. By Action
2013-04-30
08 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2013-04-22
08 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2013-04-12
08 (System) RFC Editor state changed to RFC-EDITOR from REF
2013-04-08
08 (System) RFC Editor state changed to REF from EDIT
2013-04-02
08 (System) RFC Editor state changed to EDIT from AUTH
2013-03-29
08 (System) RFC Editor state changed to AUTH from EDIT
2013-03-11
08 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent
2013-03-11
08 (System) RFC Editor state changed to EDIT
2013-03-11
08 (System) Announcement was received by RFC Editor
2013-03-08
08 (System) IANA Action state changed to No IC
2013-03-08
08 Cindy Morgan State changed to Approved-announcement sent from IESG Evaluation::AD Followup
2013-03-08
08 Cindy Morgan IESG has approved the document
2013-03-08
08 Cindy Morgan Closed "Approve" ballot
2013-03-08
08 Brian Haberman Ballot approval text was generated
2013-03-08
08 Brian Haberman Ballot writeup was changed
2013-02-21
08 Stewart Bryant [Ballot comment]
Thank you for addressing my concerns
2013-02-21
08 Stewart Bryant [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss
2013-02-21
08 (System) Sub state has been changed to AD Followup from Revised ID Needed
2013-02-21
08 Magnus Westerlund New version available: draft-ietf-6man-udpchecksums-08.txt
2013-01-24
07 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation
2013-01-24
07 Stewart Bryant
[Ballot discuss]
You say that

"Any node implementing the zero-checksum
mode MUST follow the node requirements specified in Section 4 of
"Applicability Statement for the …
[Ballot discuss]
You say that

"Any node implementing the zero-checksum
mode MUST follow the node requirements specified in Section 4 of
"Applicability Statement for the use of IPv6 UDP Datagrams with
Zero Checksums" [I-D.ietf-6man-udpzero]."

That reference points to text:

"IPv6 nodes supporting usage of zero UDP checksums MUST also
allow reception using a calculated UDP checksum on all ports
configured to allow zero UDP checksum usage.  (The sending
endpoint, e.g. encapsulating ingress, may choose to compute the
UDP checksum, or may calculate this by default.)  The receiving
endpoint MUST use the reception method specified in RFC2460 when
the checksum field is not zero."

Please clarify what you mean by "reception". Reception into the
control plane I am cool with, but reception into the tunnel forwarder
will send the packet on the slow path in most implementations
and will be showstopper in high performance tunnel applications.
This needs to be clarified and if you do mean into the forwarding
plane the issue needs to be noted.
2013-01-24
07 Stewart Bryant
[Ballot comment]
I welcome this advice
"An empirically-based analysis of the probabilities of packet
corruption (with or without checksums) has not (to our knowledge)
been …
[Ballot comment]
I welcome this advice
"An empirically-based analysis of the probabilities of packet
corruption (with or without checksums) has not (to our knowledge)
been conducted since about 2000.  At the time of publication, it
is now 2012.  We strongly suggest a new empirical study, along
with an extensive analysis of the corruption probabilities of the
IPv6 header."

However it should be noted that the cautions are provisional
pending completion of such a study, and that the caution text
should be revisited on completion of that study.
2013-01-24
07 Stewart Bryant Ballot comment and discuss text updated for Stewart Bryant
2013-01-23
07 Peter Yee Request for Telechat review by GENART Completed: Ready. Reviewer: Peter Yee.
2013-01-22
07 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner
2013-01-17
07 Jean Mahoney Request for Telechat review by GENART is assigned to Peter Yee
2013-01-17
07 Jean Mahoney Request for Telechat review by GENART is assigned to Peter Yee
2013-01-17
07 Magnus Westerlund New version available: draft-ietf-6man-udpchecksums-07.txt
2013-01-04
06 Brian Haberman Telechat date has been changed to 2013-01-24 from 2012-10-11
2013-01-04
06 Brian Haberman State changed to IESG Evaluation from Waiting for AD Go-Ahead
2012-12-26
06 Peter Yee Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Peter Yee.
2012-12-25
06 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2012-12-20
06 Pearl Liang
IANA has reviewed draft-ietf-6man-udpchecksums-06, which is currently in
Last Call, and has the following comments:

IANA understands that, upon approval of this document, there …
IANA has reviewed draft-ietf-6man-udpchecksums-06, which is currently in
Last Call, and has the following comments:

IANA understands that, upon approval of this document, there are no
IANA Actions that need completion.
2012-12-13
06 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2012-12-13
06 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2012-12-11
06 Cindy Morgan
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (IPv6 and UDP Checksums for Tunneled …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (IPv6 and UDP Checksums for Tunneled Packets) to Proposed Standard


The IESG has received a request from the IPv6 Maintenance WG (6man) to
consider the following document:
- 'IPv6 and UDP Checksums for Tunneled Packets'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2012-12-25. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document provides an update of the Internet Protocol version 6
  (IPv6) specification (RFC2460) to improve the performance in the use
  case when a tunnel protocol uses UDP with IPv6 to tunnel packets.
  The performance improvement is obtained by relaxing the IPv6 UDP
  checksum requirement for suitable tunneling protocol where header
  information is protected on the "inner" packet being carried.  This
  relaxation removes the overhead associated with the computation of
  UDP checksums on IPv6 packets used to carry tunnel protocols.  The
  specification describes how the IPv6 UDP checksum requirement can be
  relaxed for the situation where the encapsulated packet itself
  contains a checksum.  The limitations and risks of this approach are
  described, and restrictions specified on the use of the method.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-6man-udpchecksums/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-6man-udpchecksums/ballot/


No IPR declarations have been submitted directly on this I-D.


2012-12-11
06 Cindy Morgan State changed to In Last Call from Last Call Requested
2012-12-11
06 Cindy Morgan Last call announcement was generated
2012-12-11
06 Brian Haberman Last call was requested
2012-12-11
06 Brian Haberman State changed to Last Call Requested from IESG Evaluation::AD Followup
2012-12-11
06 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-12-11
06 Magnus Westerlund New version available: draft-ietf-6man-udpchecksums-06.txt
2012-12-04
05 Brian Haberman State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup
2012-10-27
05 Brian Haberman Notification list changed to : 6man-chairs@tools.ietf.org, draft-ietf-6man-udpchecksums@tools.ietf.org
2012-10-22
05 Barry Leiba
[Ballot comment]
Version -05, along with the corresponding changes to the udpzero-07 document, satisfy my concerns, and I'm happy to clear the DISCUSS and switch …
[Ballot comment]
Version -05, along with the corresponding changes to the udpzero-07 document, satisfy my concerns, and I'm happy to clear the DISCUSS and switch to YES.

Retaining for the record, here was the issue:

This was a combined DISCUSS on udpchecksums and udpzero.  I had no actual objection to publishing either of these documents.  What I' was concerned about is whether we're saying what we want to stay as a "standard".

The issue comes when I look at udpzero-06 Section 5.1 and udpchecksums-04 section 5.  The numbered list in the latter is essentially a word-for-word copy of the numbered list in the former, with the "must"s and "may"s and "should not"s changed to upper case.  It always bothers me when a significant amount of important text is duplicated like that, but the real problem comes when I look at what this *says*.

Because udpzero is informational, when it says, "If a zero checksum approach were to be adopted by the IETF, the specification should consider adding the following constraints on usage," that makes no normative requirement on any future protocol that runs on UDP and decides to bypass the UDP checksums.  Now, of course, we also have a document, udpchecksums, which defines what to do if you do tunneling on UDP and you want to skip the outer checksums (because you have inner ones).  *That* document makes this list normative.

But what happens if, later, someone decides to document how to do, let's say, media streaming over UDP with zero checksums.  The analysis in udpzero applies, of course, but the new document is under no obligation to consider it or any of those usage restrictions in Section 5.1.  (It might be that such a document could never get past the current community and ADs, but I'm not sure we want to leave that to chance.)

So the question comes to what we want to say normatively.  Which is it that we want a standard saying?

1. If you tunnel packets over UDP and want to avoid the UDP checksums, you need to use this list of restrictions.  But other applications over UDP that want to avoid the UDP checksums can make entirely different decisions.

or

2. If you do *anything* over UDP and want to avoid the UDP checksums, you need to use this list of restrictions.  And here's how tunneling over UDP works.

I think (2) is right, but the way the documents were structured said (1).

Discussion cleared, and thanks for working with me on this.
2012-10-22
05 Barry Leiba [Ballot Position Update] Position for Barry Leiba has been changed to Yes from Discuss
2012-10-22
05 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-10-22
05 Magnus Westerlund New version available: draft-ietf-6man-udpchecksums-05.txt
2012-10-12
04 Ron Bonica [Ballot Position Update] Position for Ronald Bonica has been changed to Yes from Discuss
2012-10-11
04 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation
2012-10-11
04 Stephen Farrell
[Ballot comment]

- The DCCP-UDP tunnel draft [1] says you MUST have a non-zero
UDP checksum. Does that conflict with this or need to be …
[Ballot comment]

- The DCCP-UDP tunnel draft [1] says you MUST have a non-zero
UDP checksum. Does that conflict with this or need to be called out
as an exception? (And if so, does anything else?)

  [1] http://datatracker.ietf.org/doc/draft-ietf-dccp-udpencap/

- Ought 6man-udpzero be a normative reference? Seems odd to say
this "requires" that (top of p7) but for the referred thing to
be informative and an informational RFC. Is all the right text
in the right places?

- The secdir review [2] suggested calling more stuff out to
application developers, which seems worth considering.

  [2] http://www.ietf.org/mail-archive/web/secdir/current/msg03555.html
2012-10-11
04 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2012-10-11
04 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2012-10-10
04 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2012-10-10
04 Brian Haberman State changed to IESG Evaluation from Waiting for AD Go-Ahead
2012-10-10
04 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2012-10-09
04 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy
2012-10-09
04 Benoît Claise
[Ballot comment]
No objection to the publication of this document, but I really would like to have the following requirement clarified.

2.  Implementations MUST provide …
[Ballot comment]
No objection to the publication of this document, but I really would like to have the following requirement clarified.

2.  Implementations MUST provide a way to signal the set of ports
          that will be enabled to receive UDP datagrams with a zero
          checksum.

What is an implementation? The application running over the tunnel? You refer to "An encapsulating protocol" in the sentence before the bullet points, is this what you mean?
If yes, signal from where to whom?
Or maybe by "implementation" you mean "IPv6 protocol stack implementation"
2012-10-09
04 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2012-10-09
04 Ron Bonica [Ballot discuss]
This DISCUSS is related to my DISCUSS on the udpzero document. As soon as that DISCUSS is addressed, I will clear this one.
2012-10-09
04 Ron Bonica [Ballot Position Update] New position, Discuss, has been recorded for Ronald Bonica
2012-10-09
04 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded for Ralph Droms
2012-10-08
04 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks
2012-10-08
04 Russ Housley
[Ballot comment]

  Please consider the non-blocking comments from the Gen-ART Review by
  Peter Yee on 30-Sep-2012.  You can find the review here:
  …
[Ballot comment]

  Please consider the non-blocking comments from the Gen-ART Review by
  Peter Yee on 30-Sep-2012.  You can find the review here:
  http://www.ietf.org/mail-archive/web/gen-art/current/msg07809.html
2012-10-08
04 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley
2012-10-08
04 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2012-10-07
04 Stewart Bryant
[Ballot discuss]
Please see my discuss on draft-ietf-6man-udpzero, and note that I hope to get to yes on this draft also, since I support …
[Ballot discuss]
Please see my discuss on draft-ietf-6man-udpzero, and note that I hope to get to yes on this draft also, since I support the liberalization of this protocol design when used for tunnelling. Specifically point 6 in this draft is relevant to this discussion.
Additionally a tunnel may not have any way of knowing if the payload is protected (as you suggest), since normally a tunnel has no knowledge of the payload characteristics.

In point 7 you suggest that an application cannot rely on packet length. When PWs are used for tunneling we rely on exactly that (except in the case of packets shorter than 64 octets for Ethenet padding reasons), and I am not aware of any reported issues. Thus when the application is tunnel encap/decap there is a body of evidence that suggests that this OK.
2012-10-07
04 Stewart Bryant
[Ballot comment]
There is some text in the earlier part of document that looks like it should be written in RFC2119 format. In this case …
[Ballot comment]
There is some text in the earlier part of document that looks like it should be written in RFC2119 format. In this case it is not important because the normative change is later and this used RFC2119 directives, however the authors should consider making the document self consistent in this regard.
2012-10-07
04 Stewart Bryant [Ballot Position Update] New position, Discuss, has been recorded for Stewart Bryant
2012-10-04
04 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2012-10-04
04 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2012-10-04
04 Brian Haberman Notification list changed to : 6man-chairs@tools.ietf.org, draft-ietf-6man-udpchecksums@tools.ietf.org, ipv6@ietf.org
2012-10-04
04 Brian Haberman Notification list changed to : 6man-chairs@tools.ietf.org, draft-ietf-6man-udpchecksums@tools.ietf.org
2012-10-04
04 Barry Leiba
[Ballot discuss]
This is a combined DISCUSS on udpchecksums and udpzero.  First, let me say that I have no actual objection to publishing either of …
[Ballot discuss]
This is a combined DISCUSS on udpchecksums and udpzero.  First, let me say that I have no actual objection to publishing either of these documents.  What I'm concerned about is whether we're saying what we want to stay as a "standard", so let's discuss that:

The issue comes when I look at udpzero Section 5.1 and udpchecksums section 5.  The numbered list in the latter is essentially a word-for-word copy of the numbered list in the former, with the "must"s and "may"s and "should not"s changed to upper case.  It always bothers me when a significant amount of important text is duplicated like that, but the real problem comes when I look at what this *says*.

Because udpzero is informational, when it says, "If a zero checksum approach were to be adopted by the IETF, the specification should consider adding the following constraints on usage," that makes no normative requirement on any future protocol that runs on UDP and decides to bypass the UDP checksums.  Now, of course, we also have a document, udpchecksums, which defines what to do if you do tunneling on UDP and you want to skip the outer checksums (because you have inner ones).  *That* document makes this list normative.

But what happens if, later, someone decides to document how to do, let's say, media streaming over UDP with zero checksums.  The analysis in udpzero applies, of course, but the new document is under no obligation to consider it or any of those usage restrictions in Section 5.1.  (It might be that such a document could never get past the current community and ADs, but I'm not sure we want to leave that to chance.)

So the question comes to what we want to say normatively.  Which is it that we want a standard saying?

1. If you tunnel packets over UDP and want to avoid the UDP checksums, you need to use this list of restrictions.  But other applications over UDP that want to avoid the UDP checksums can make entirely different decisions.

or

2. If you do *anything* over UDP and want to avoid the UDP checksums, you need to use this list of restrictions.  And here's how tunneling over UDP works.

I think (2) is right, but the way the documents are structured now says (1).

Discussion, please....
2012-10-04
04 Barry Leiba [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba
2012-10-04
04 Tero Kivinen Request for Last Call review by SECDIR Completed: Ready with Nits. Reviewer: David Waltermire.
2012-10-03
04 Peter Yee Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Peter Yee.
2012-10-02
04 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2012-09-30
04 Pearl Liang
IANA has reviewed draft-ietf-6man-udpchecksums-04, which is currently
in Last Call, and has the following comments:

We understand that this document doesn't require any IANA …
IANA has reviewed draft-ietf-6man-udpchecksums-04, which is currently
in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions.
2012-09-27
04 Brian Haberman Removed telechat returning item indication
2012-09-20
04 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2012-09-20
04 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2012-09-20
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to David Waltermire
2012-09-20
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to David Waltermire
2012-09-18
04 Brian Haberman Telechat date has been changed to 2012-10-11 from 2012-09-27
2012-09-18
04 Brian Haberman Ballot has been issued
2012-09-18
04 Brian Haberman [Ballot Position Update] New position, Yes, has been recorded for Brian Haberman
2012-09-18
04 Brian Haberman Created "Approve" ballot
2012-09-18
04 Brian Haberman Placed on agenda for telechat - 2012-09-27
2012-09-18
04 Brian Haberman Ballot writeup was changed
2012-09-18
04 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (UDP Checksums for Tunneled Packets) to …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (UDP Checksums for Tunneled Packets) to Proposed Standard


The IESG has received a request from the IPv6 Maintenance WG (6man) to
consider the following document:
- 'UDP Checksums for Tunneled Packets'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2012-10-02. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document provides an update of the Internet Protocol version 6
  (IPv6) specification (RFC2460) to improve the performance of IPv6 in
  the use case when a tunnel protocol uses UDP with IPv6 to tunnel
  packets.  The performance improvement is obtained by relaxing the
  IPv6 UDP checksum requirement for suitable tunneling protocol where
  header information is protected on the "inner" packet being carried.
  This relaxation removes the overhead associated with the computation
  of UDP checksums on IPv6 packets used to carry tunnel protocols and
  thereby improves the efficiency of the traversal of firewalls and
  other network middleboxes by such protocols.  We describe how the
  IPv6 UDP checksum requirement can be relaxed in the situation where
  the encapsulated packet itself contains a checksum, the limitations
  and risks of this approach, and defines restrictions on the use of
  this relaxation to mitigate these risks.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-6man-udpchecksums/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-6man-udpchecksums/ballot/


No IPR declarations have been submitted directly on this I-D.


2012-09-18
04 Amy Vezza State changed to In Last Call from Last Call Requested
2012-09-18
04 Brian Haberman Last call was requested
2012-09-18
04 Brian Haberman Last call announcement was generated
2012-09-18
04 Brian Haberman Ballot approval text was generated
2012-09-18
04 Brian Haberman Ballot writeup was generated
2012-09-18
04 Brian Haberman State changed to Last Call Requested from AD Evaluation
2012-09-18
04 Brian Haberman State changed to AD Evaluation from Publication Requested
2012-09-13
04 Brian Haberman Intended Status changed to Proposed Standard
2012-09-13
04 Brian Haberman IESG process started in state Publication Requested
2012-09-13
04 Ole Trøan Changed protocol writeup
2012-09-12
04 Ole Trøan IETF state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2012-09-12
04 Ole Trøan Changed protocol writeup
2012-09-11
04 Ole Trøan IETF state changed to WG Consensus: Waiting for Write-Up from WG Document
2012-09-11
04 Ole Trøan Submitted to the IESG.
2012-09-11
04 Ole Trøan Passed WGLC.
2012-09-11
04 Ole Trøan Changed shepherd to Ole Troan
2012-09-05
04 Magnus Westerlund New version available: draft-ietf-6man-udpchecksums-04.txt
2012-08-07
03 Magnus Westerlund New version available: draft-ietf-6man-udpchecksums-03.txt
2012-03-12
02 Marshall Eubanks New version available: draft-ietf-6man-udpchecksums-02.txt
2011-10-31
01 (System) New version available: draft-ietf-6man-udpchecksums-01.txt
2011-09-08
01 (System) Document has expired
2011-03-07
00 (System) New version available: draft-ietf-6man-udpchecksums-00.txt