IPv6 and UDP Checksums for Tunneled Packets
draft-ietf-6man-udpchecksums-08
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2013-04-30
|
08 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2013-04-22
|
08 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2013-04-12
|
08 | (System) | RFC Editor state changed to RFC-EDITOR from REF |
2013-04-08
|
08 | (System) | RFC Editor state changed to REF from EDIT |
2013-04-02
|
08 | (System) | RFC Editor state changed to EDIT from AUTH |
2013-03-29
|
08 | (System) | RFC Editor state changed to AUTH from EDIT |
2013-03-11
|
08 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent |
2013-03-11
|
08 | (System) | RFC Editor state changed to EDIT |
2013-03-11
|
08 | (System) | Announcement was received by RFC Editor |
2013-03-08
|
08 | (System) | IANA Action state changed to No IC |
2013-03-08
|
08 | Cindy Morgan | State changed to Approved-announcement sent from IESG Evaluation::AD Followup |
2013-03-08
|
08 | Cindy Morgan | IESG has approved the document |
2013-03-08
|
08 | Cindy Morgan | Closed "Approve" ballot |
2013-03-08
|
08 | Brian Haberman | Ballot approval text was generated |
2013-03-08
|
08 | Brian Haberman | Ballot writeup was changed |
2013-02-21
|
08 | Stewart Bryant | [Ballot comment] Thank you for addressing my concerns |
2013-02-21
|
08 | Stewart Bryant | [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss |
2013-02-21
|
08 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2013-02-21
|
08 | Magnus Westerlund | New version available: draft-ietf-6man-udpchecksums-08.txt |
2013-01-24
|
07 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation |
2013-01-24
|
07 | Stewart Bryant | [Ballot discuss] You say that "Any node implementing the zero-checksum mode MUST follow the node requirements specified in Section 4 of "Applicability Statement for the … [Ballot discuss] You say that "Any node implementing the zero-checksum mode MUST follow the node requirements specified in Section 4 of "Applicability Statement for the use of IPv6 UDP Datagrams with Zero Checksums" [I-D.ietf-6man-udpzero]." That reference points to text: "IPv6 nodes supporting usage of zero UDP checksums MUST also allow reception using a calculated UDP checksum on all ports configured to allow zero UDP checksum usage. (The sending endpoint, e.g. encapsulating ingress, may choose to compute the UDP checksum, or may calculate this by default.) The receiving endpoint MUST use the reception method specified in RFC2460 when the checksum field is not zero." Please clarify what you mean by "reception". Reception into the control plane I am cool with, but reception into the tunnel forwarder will send the packet on the slow path in most implementations and will be showstopper in high performance tunnel applications. This needs to be clarified and if you do mean into the forwarding plane the issue needs to be noted. |
2013-01-24
|
07 | Stewart Bryant | [Ballot comment] I welcome this advice "An empirically-based analysis of the probabilities of packet corruption (with or without checksums) has not (to our knowledge) been … [Ballot comment] I welcome this advice "An empirically-based analysis of the probabilities of packet corruption (with or without checksums) has not (to our knowledge) been conducted since about 2000. At the time of publication, it is now 2012. We strongly suggest a new empirical study, along with an extensive analysis of the corruption probabilities of the IPv6 header." However it should be noted that the cautions are provisional pending completion of such a study, and that the caution text should be revisited on completion of that study. |
2013-01-24
|
07 | Stewart Bryant | Ballot comment and discuss text updated for Stewart Bryant |
2013-01-23
|
07 | Peter Yee | Request for Telechat review by GENART Completed: Ready. Reviewer: Peter Yee. |
2013-01-22
|
07 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner |
2013-01-17
|
07 | Jean Mahoney | Request for Telechat review by GENART is assigned to Peter Yee |
2013-01-17
|
07 | Jean Mahoney | Request for Telechat review by GENART is assigned to Peter Yee |
2013-01-17
|
07 | Magnus Westerlund | New version available: draft-ietf-6man-udpchecksums-07.txt |
2013-01-04
|
06 | Brian Haberman | Telechat date has been changed to 2013-01-24 from 2012-10-11 |
2013-01-04
|
06 | Brian Haberman | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2012-12-26
|
06 | Peter Yee | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Peter Yee. |
2012-12-25
|
06 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2012-12-20
|
06 | Pearl Liang | IANA has reviewed draft-ietf-6man-udpchecksums-06, which is currently in Last Call, and has the following comments: IANA understands that, upon approval of this document, there … IANA has reviewed draft-ietf-6man-udpchecksums-06, which is currently in Last Call, and has the following comments: IANA understands that, upon approval of this document, there are no IANA Actions that need completion. |
2012-12-13
|
06 | Jean Mahoney | Request for Last Call review by GENART is assigned to Peter Yee |
2012-12-13
|
06 | Jean Mahoney | Request for Last Call review by GENART is assigned to Peter Yee |
2012-12-11
|
06 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (IPv6 and UDP Checksums for Tunneled … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (IPv6 and UDP Checksums for Tunneled Packets) to Proposed Standard The IESG has received a request from the IPv6 Maintenance WG (6man) to consider the following document: - 'IPv6 and UDP Checksums for Tunneled Packets' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2012-12-25. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document provides an update of the Internet Protocol version 6 (IPv6) specification (RFC2460) to improve the performance in the use case when a tunnel protocol uses UDP with IPv6 to tunnel packets. The performance improvement is obtained by relaxing the IPv6 UDP checksum requirement for suitable tunneling protocol where header information is protected on the "inner" packet being carried. This relaxation removes the overhead associated with the computation of UDP checksums on IPv6 packets used to carry tunnel protocols. The specification describes how the IPv6 UDP checksum requirement can be relaxed for the situation where the encapsulated packet itself contains a checksum. The limitations and risks of this approach are described, and restrictions specified on the use of the method. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-6man-udpchecksums/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-6man-udpchecksums/ballot/ No IPR declarations have been submitted directly on this I-D. |
2012-12-11
|
06 | Cindy Morgan | State changed to In Last Call from Last Call Requested |
2012-12-11
|
06 | Cindy Morgan | Last call announcement was generated |
2012-12-11
|
06 | Brian Haberman | Last call was requested |
2012-12-11
|
06 | Brian Haberman | State changed to Last Call Requested from IESG Evaluation::AD Followup |
2012-12-11
|
06 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2012-12-11
|
06 | Magnus Westerlund | New version available: draft-ietf-6man-udpchecksums-06.txt |
2012-12-04
|
05 | Brian Haberman | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup |
2012-10-27
|
05 | Brian Haberman | Notification list changed to : 6man-chairs@tools.ietf.org, draft-ietf-6man-udpchecksums@tools.ietf.org |
2012-10-22
|
05 | Barry Leiba | [Ballot comment] Version -05, along with the corresponding changes to the udpzero-07 document, satisfy my concerns, and I'm happy to clear the DISCUSS and switch … [Ballot comment] Version -05, along with the corresponding changes to the udpzero-07 document, satisfy my concerns, and I'm happy to clear the DISCUSS and switch to YES. Retaining for the record, here was the issue: This was a combined DISCUSS on udpchecksums and udpzero. I had no actual objection to publishing either of these documents. What I' was concerned about is whether we're saying what we want to stay as a "standard". The issue comes when I look at udpzero-06 Section 5.1 and udpchecksums-04 section 5. The numbered list in the latter is essentially a word-for-word copy of the numbered list in the former, with the "must"s and "may"s and "should not"s changed to upper case. It always bothers me when a significant amount of important text is duplicated like that, but the real problem comes when I look at what this *says*. Because udpzero is informational, when it says, "If a zero checksum approach were to be adopted by the IETF, the specification should consider adding the following constraints on usage," that makes no normative requirement on any future protocol that runs on UDP and decides to bypass the UDP checksums. Now, of course, we also have a document, udpchecksums, which defines what to do if you do tunneling on UDP and you want to skip the outer checksums (because you have inner ones). *That* document makes this list normative. But what happens if, later, someone decides to document how to do, let's say, media streaming over UDP with zero checksums. The analysis in udpzero applies, of course, but the new document is under no obligation to consider it or any of those usage restrictions in Section 5.1. (It might be that such a document could never get past the current community and ADs, but I'm not sure we want to leave that to chance.) So the question comes to what we want to say normatively. Which is it that we want a standard saying? 1. If you tunnel packets over UDP and want to avoid the UDP checksums, you need to use this list of restrictions. But other applications over UDP that want to avoid the UDP checksums can make entirely different decisions. or 2. If you do *anything* over UDP and want to avoid the UDP checksums, you need to use this list of restrictions. And here's how tunneling over UDP works. I think (2) is right, but the way the documents were structured said (1). Discussion cleared, and thanks for working with me on this. |
2012-10-22
|
05 | Barry Leiba | [Ballot Position Update] Position for Barry Leiba has been changed to Yes from Discuss |
2012-10-22
|
05 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2012-10-22
|
05 | Magnus Westerlund | New version available: draft-ietf-6man-udpchecksums-05.txt |
2012-10-12
|
04 | Ron Bonica | [Ballot Position Update] Position for Ronald Bonica has been changed to Yes from Discuss |
2012-10-11
|
04 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation |
2012-10-11
|
04 | Stephen Farrell | [Ballot comment] - The DCCP-UDP tunnel draft [1] says you MUST have a non-zero UDP checksum. Does that conflict with this or need to be … [Ballot comment] - The DCCP-UDP tunnel draft [1] says you MUST have a non-zero UDP checksum. Does that conflict with this or need to be called out as an exception? (And if so, does anything else?) [1] http://datatracker.ietf.org/doc/draft-ietf-dccp-udpencap/ - Ought 6man-udpzero be a normative reference? Seems odd to say this "requires" that (top of p7) but for the referred thing to be informative and an informational RFC. Is all the right text in the right places? - The secdir review [2] suggested calling more stuff out to application developers, which seems worth considering. [2] http://www.ietf.org/mail-archive/web/secdir/current/msg03555.html |
2012-10-11
|
04 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2012-10-11
|
04 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2012-10-10
|
04 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2012-10-10
|
04 | Brian Haberman | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2012-10-10
|
04 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2012-10-09
|
04 | Wesley Eddy | [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy |
2012-10-09
|
04 | Benoît Claise | [Ballot comment] No objection to the publication of this document, but I really would like to have the following requirement clarified. 2. Implementations MUST provide … [Ballot comment] No objection to the publication of this document, but I really would like to have the following requirement clarified. 2. Implementations MUST provide a way to signal the set of ports that will be enabled to receive UDP datagrams with a zero checksum. What is an implementation? The application running over the tunnel? You refer to "An encapsulating protocol" in the sentence before the bullet points, is this what you mean? If yes, signal from where to whom? Or maybe by "implementation" you mean "IPv6 protocol stack implementation" |
2012-10-09
|
04 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2012-10-09
|
04 | Ron Bonica | [Ballot discuss] This DISCUSS is related to my DISCUSS on the udpzero document. As soon as that DISCUSS is addressed, I will clear this one. |
2012-10-09
|
04 | Ron Bonica | [Ballot Position Update] New position, Discuss, has been recorded for Ronald Bonica |
2012-10-09
|
04 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded for Ralph Droms |
2012-10-08
|
04 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks |
2012-10-08
|
04 | Russ Housley | [Ballot comment] Please consider the non-blocking comments from the Gen-ART Review by Peter Yee on 30-Sep-2012. You can find the review here: … [Ballot comment] Please consider the non-blocking comments from the Gen-ART Review by Peter Yee on 30-Sep-2012. You can find the review here: http://www.ietf.org/mail-archive/web/gen-art/current/msg07809.html |
2012-10-08
|
04 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley |
2012-10-08
|
04 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2012-10-07
|
04 | Stewart Bryant | [Ballot discuss] Please see my discuss on draft-ietf-6man-udpzero, and note that I hope to get to yes on this draft also, since I support … [Ballot discuss] Please see my discuss on draft-ietf-6man-udpzero, and note that I hope to get to yes on this draft also, since I support the liberalization of this protocol design when used for tunnelling. Specifically point 6 in this draft is relevant to this discussion. Additionally a tunnel may not have any way of knowing if the payload is protected (as you suggest), since normally a tunnel has no knowledge of the payload characteristics. In point 7 you suggest that an application cannot rely on packet length. When PWs are used for tunneling we rely on exactly that (except in the case of packets shorter than 64 octets for Ethenet padding reasons), and I am not aware of any reported issues. Thus when the application is tunnel encap/decap there is a body of evidence that suggests that this OK. |
2012-10-07
|
04 | Stewart Bryant | [Ballot comment] There is some text in the earlier part of document that looks like it should be written in RFC2119 format. In this case … [Ballot comment] There is some text in the earlier part of document that looks like it should be written in RFC2119 format. In this case it is not important because the normative change is later and this used RFC2119 directives, however the authors should consider making the document self consistent in this regard. |
2012-10-07
|
04 | Stewart Bryant | [Ballot Position Update] New position, Discuss, has been recorded for Stewart Bryant |
2012-10-04
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Peter Yee |
2012-10-04
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Peter Yee |
2012-10-04
|
04 | Brian Haberman | Notification list changed to : 6man-chairs@tools.ietf.org, draft-ietf-6man-udpchecksums@tools.ietf.org, ipv6@ietf.org |
2012-10-04
|
04 | Brian Haberman | Notification list changed to : 6man-chairs@tools.ietf.org, draft-ietf-6man-udpchecksums@tools.ietf.org |
2012-10-04
|
04 | Barry Leiba | [Ballot discuss] This is a combined DISCUSS on udpchecksums and udpzero. First, let me say that I have no actual objection to publishing either of … [Ballot discuss] This is a combined DISCUSS on udpchecksums and udpzero. First, let me say that I have no actual objection to publishing either of these documents. What I'm concerned about is whether we're saying what we want to stay as a "standard", so let's discuss that: The issue comes when I look at udpzero Section 5.1 and udpchecksums section 5. The numbered list in the latter is essentially a word-for-word copy of the numbered list in the former, with the "must"s and "may"s and "should not"s changed to upper case. It always bothers me when a significant amount of important text is duplicated like that, but the real problem comes when I look at what this *says*. Because udpzero is informational, when it says, "If a zero checksum approach were to be adopted by the IETF, the specification should consider adding the following constraints on usage," that makes no normative requirement on any future protocol that runs on UDP and decides to bypass the UDP checksums. Now, of course, we also have a document, udpchecksums, which defines what to do if you do tunneling on UDP and you want to skip the outer checksums (because you have inner ones). *That* document makes this list normative. But what happens if, later, someone decides to document how to do, let's say, media streaming over UDP with zero checksums. The analysis in udpzero applies, of course, but the new document is under no obligation to consider it or any of those usage restrictions in Section 5.1. (It might be that such a document could never get past the current community and ADs, but I'm not sure we want to leave that to chance.) So the question comes to what we want to say normatively. Which is it that we want a standard saying? 1. If you tunnel packets over UDP and want to avoid the UDP checksums, you need to use this list of restrictions. But other applications over UDP that want to avoid the UDP checksums can make entirely different decisions. or 2. If you do *anything* over UDP and want to avoid the UDP checksums, you need to use this list of restrictions. And here's how tunneling over UDP works. I think (2) is right, but the way the documents are structured now says (1). Discussion, please.... |
2012-10-04
|
04 | Barry Leiba | [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba |
2012-10-04
|
04 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Ready with Nits. Reviewer: David Waltermire. |
2012-10-03
|
04 | Peter Yee | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Peter Yee. |
2012-10-02
|
04 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2012-09-30
|
04 | Pearl Liang | IANA has reviewed draft-ietf-6man-udpchecksums-04, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any IANA … IANA has reviewed draft-ietf-6man-udpchecksums-04, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any IANA actions. |
2012-09-27
|
04 | Brian Haberman | Removed telechat returning item indication |
2012-09-20
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Peter Yee |
2012-09-20
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Peter Yee |
2012-09-20
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to David Waltermire |
2012-09-20
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to David Waltermire |
2012-09-18
|
04 | Brian Haberman | Telechat date has been changed to 2012-10-11 from 2012-09-27 |
2012-09-18
|
04 | Brian Haberman | Ballot has been issued |
2012-09-18
|
04 | Brian Haberman | [Ballot Position Update] New position, Yes, has been recorded for Brian Haberman |
2012-09-18
|
04 | Brian Haberman | Created "Approve" ballot |
2012-09-18
|
04 | Brian Haberman | Placed on agenda for telechat - 2012-09-27 |
2012-09-18
|
04 | Brian Haberman | Ballot writeup was changed |
2012-09-18
|
04 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (UDP Checksums for Tunneled Packets) to … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (UDP Checksums for Tunneled Packets) to Proposed Standard The IESG has received a request from the IPv6 Maintenance WG (6man) to consider the following document: - 'UDP Checksums for Tunneled Packets' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2012-10-02. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document provides an update of the Internet Protocol version 6 (IPv6) specification (RFC2460) to improve the performance of IPv6 in the use case when a tunnel protocol uses UDP with IPv6 to tunnel packets. The performance improvement is obtained by relaxing the IPv6 UDP checksum requirement for suitable tunneling protocol where header information is protected on the "inner" packet being carried. This relaxation removes the overhead associated with the computation of UDP checksums on IPv6 packets used to carry tunnel protocols and thereby improves the efficiency of the traversal of firewalls and other network middleboxes by such protocols. We describe how the IPv6 UDP checksum requirement can be relaxed in the situation where the encapsulated packet itself contains a checksum, the limitations and risks of this approach, and defines restrictions on the use of this relaxation to mitigate these risks. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-6man-udpchecksums/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-6man-udpchecksums/ballot/ No IPR declarations have been submitted directly on this I-D. |
2012-09-18
|
04 | Amy Vezza | State changed to In Last Call from Last Call Requested |
2012-09-18
|
04 | Brian Haberman | Last call was requested |
2012-09-18
|
04 | Brian Haberman | Last call announcement was generated |
2012-09-18
|
04 | Brian Haberman | Ballot approval text was generated |
2012-09-18
|
04 | Brian Haberman | Ballot writeup was generated |
2012-09-18
|
04 | Brian Haberman | State changed to Last Call Requested from AD Evaluation |
2012-09-18
|
04 | Brian Haberman | State changed to AD Evaluation from Publication Requested |
2012-09-13
|
04 | Brian Haberman | Intended Status changed to Proposed Standard |
2012-09-13
|
04 | Brian Haberman | IESG process started in state Publication Requested |
2012-09-13
|
04 | Ole Trøan | Changed protocol writeup |
2012-09-12
|
04 | Ole Trøan | IETF state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2012-09-12
|
04 | Ole Trøan | Changed protocol writeup |
2012-09-11
|
04 | Ole Trøan | IETF state changed to WG Consensus: Waiting for Write-Up from WG Document |
2012-09-11
|
04 | Ole Trøan | Submitted to the IESG. |
2012-09-11
|
04 | Ole Trøan | Passed WGLC. |
2012-09-11
|
04 | Ole Trøan | Changed shepherd to Ole Troan |
2012-09-05
|
04 | Magnus Westerlund | New version available: draft-ietf-6man-udpchecksums-04.txt |
2012-08-07
|
03 | Magnus Westerlund | New version available: draft-ietf-6man-udpchecksums-03.txt |
2012-03-12
|
02 | Marshall Eubanks | New version available: draft-ietf-6man-udpchecksums-02.txt |
2011-10-31
|
01 | (System) | New version available: draft-ietf-6man-udpchecksums-01.txt |
2011-09-08
|
01 | (System) | Document has expired |
2011-03-07
|
00 | (System) | New version available: draft-ietf-6man-udpchecksums-00.txt |