Hi,

FWIW, Here's what I was saying at the mic during the ipsec meeting @117. It may 
have relevance to the discussion about EMTU...

You own the tunnel endpoints since you're configuring security tunnels on them. 
Normal PMTU will work fine if, for some reason, you need your ingress to 
discover the egress endpoint's nexthop MTU (red-side link) dynamically. This is 
b/c your not going to configure your own tunnel endpoints to drop ICMP too big 
packets and break it yourself. So, you don't need any new mechanism to discover 
your own downstream red side link MTUs.

Also, I'm pretty sure that most transit routers are configured to never 
fragment forwarded packets (it's a DDOS attack vector), so I don't think your 
going to be seeing the outer ESP IP packet be fragmented either. This 
functionality is so unpopular it was completely eliminated from IPv6, so it for 
sure will never happen if your outer encap is IPv6.

Thanks,
Chris.

Daniel Migault <[email protected]> writes:

Hi Ben,

Just trying to position our understanding of  the position between the ICMP PTB 
and the IKE PTB.

If an incoming Encrypted packet is larger than the Link MTU, an ICMP PTB is 
sent, otherwise the packet is accepted. If fragments are received, a reassembly 
operation happens and the packet may be too large to be built or decrypted. I 
am unaware of any ICMP signaling between the gateway that could carry this 
information. As far as I understand, ICMP PTB is not issued for a reassembled 
packet as long as each of the fragments are below the MTU. This is the reason 
we send the EMTU_R which designates the maximum size the egress gateway can 
handle.

EMTU_R could be a configuration parameter that would not change, but that value 
also considers the MTU of the router part which can be changed.

As soon as it passes the interface, as I understand it, an ICMP PTB will be 
sent to the Source and not the gateway. As I understand it, EMTU_R defines the 
maximum payload the Link network is able to handle. In our case, the payload is 
the encrypted ESP packet that may have been reassembled. The packet is passed 
to the decryption.  Once decrypted, the clear text packet is passed to the 
router of the node. The router may send an ICMP PTB, which will be sent to the 
Source or treat that packet. I see EMTU_R as reflecting the node of the router 
with Tunnel MTU = EMTU_R - ESP overhead

Considering a ping encapsulated in esp - we may discover the MTU as well as the 
EMTU_R by fragmenting unless we meet EMTU_R.

Note also that since we want to avoid fragmentation having a discovery 
mechanism that relies on fragmentation may not be the best idea.

Yours,
Daniel


On Mon, Jul 31, 2023 at 1:22 PM Daniel Migault <[email protected]>
wrote:

    An encapsulated ICMP ECHO would get a response from the router
    (not the interface) of the security gateway. I have not read
    carefully draft-colitti-ipsecme-esp-ping but this is potentially
    what we could use to discover that path upon which we could set
    DF=1. That said, if MTU changes, we need to receive a
    notification. 
    I tend to think that extending  colitti-ipsecme-esp-ping to other
    ICMP plus defining PLMTU could replace our IKE PTB. 


    On Mon, Jul 31, 2023 at 12:57 PM Ben Schwartz <[email protected]>
    wrote:

        It seems to me that the statement "This packet is too big for
        me to decrypt" is quite different from "This packet arrived
        fragmented".  The former can generally be negotiated in the
        handshake, whereas the latter is a dynamic behavior of the
        underlying path.

        Monitoring the Path MTU is important, even when the path
        traverses an ICMP blackhole.  So while I don't see the value
        of the PTB extension, I can understand the rationale for the
        LMAP extension.  However, I would like to see a bit more
        description of the whole system.  How do I send path probes
        to elicit these responses?  Can I use ICMP ECHO inside the
        tunnel, or do we need draft-colitti-ipsecme-esp-ping?  If we
        have path probes, why not just set DF=1 on the outer header
        for PMTUD?

        --Ben Schwartz

        From: Daniel Migault <[email protected]>
        Sent: Monday, July 31, 2023 12:10 PM
        To: Ben Schwartz <[email protected]>
        Cc: Harold Liu <[email protected]>;
        [email protected] <[email protected]>
        Subject: Re: [IPsec] -ikev2-mtu-dect: IKEv2 PTB Notification
         
        Hi Ben, Please see my comments. On Mon, Jul 31, 2023 at
        10: 47 AM Ben Schwartz <bemasc@ meta. com> wrote: Hi Harold,
        It sounds like you're describing a different problem. Daniel
        mentioned a concern about cases in which "the encrypted
        Hi Ben,
        Please see my comments. 
        On Mon, Jul 31, 2023 at 10:47 AM Ben Schwartz <
        [email protected]> wrote:

            Hi Harold,

            It sounds like you're describing a different problem. 
            Daniel mentioned a concern about cases in which "the
            encrypted packet is too big and so cannot be decrypted". 

        We see the MTU indicating the size the packet the egress
        interface is able to handle which includes the ability to
        reassemble and decrypt the packet. In that sense, I see
        sending the EMTU_R as very similar to an ICMP PTB except. I
        am wondering if you see any reasons for these issues to be
        considered differently and how you think such distinction
        could help. 

            That's quite different from an MTU limit on the
            forwarding path, which can be dealt with using ordinary
            IP fragmentation and PMTUD.

        Fragmentation works, but costs too much resources and this
        draft is aiming at reducing such operations. Our concern is
        with IPv4, where DF=1 leads to a blackholing situation. PMTUD
        is extremely difficult as ICMP messages are not received by
        the ingress gateway.
        PLMTUD I-D.spiriyath-ipsecme-dynamic-ipsec-pmtu for ESP is
        another path, but it would take a lot of effort.  
         
        Yours, 
        Daniel
         

            --Ben SchwartzI-D.spiriyath-ipsecme-dynamic-ipsec-pmtu

            From: Harold Liu <harold.liu=
            [email protected]>
            Sent: Sunday, July 30, 2023 9:28 PM
            To: Ben Schwartz <[email protected]>; Daniel Migault <
            [email protected]>
            Cc: [email protected] <[email protected]>
            Subject: RE: [IPsec] -ikev2-mtu-dect: IKEv2 PTB
            Notification
             
            Ben, thanks for your comment. Yes at the beginning we
            thought what you thought, we consider the solution as
            “Negotiate it up front (in IKEv2)”, however the challenge
            here is the MTU of the router on the forwarding path can
            be changed at any

            Ben, thanks for your comment.

             

            Yes at the beginning we thought what you thought, we
            consider the solution as “Negotiate it up front (in
            IKEv2)”, however the challenge here is the MTU of the
            router on the forwarding path can be changed at any time
            (for example, the router changes the configuration for
            some reason, or changes the forwarding path for some
            reason).

             

            If the MTU of any forwarding node on the forwarding path
            changes (even as to the whole forwarding path changes), a
            pre-negotiated MTU is probably not applicable. Therefore,
            we defined the solution is to discover MTU in-band via
            error responses.

             

            Brs

             

            From: IPsec <[email protected]> On Behalf Of Ben
            Schwartz
            Sent: Saturday, July 29, 2023 8:01 AM
            To: Daniel Migault <[email protected]>
            Cc: [email protected]
            Subject: Re: [IPsec] -ikev2-mtu-dect: IKEv2 PTB
            Notification

             

            +mailing list (oops)

             

            I think I understand the difficulty here.  In IPv6, a
            "maximum reassembled ESP size" can be modeled as a
            next-hop MTU on the plaintext, but in IPv4 an enormous
            ESP could be decrypted and fragmented forward over a next
            hop with a reasonable MTU.

             

            If this kind of ESP size limit is allowed, I think the
            best architecture would be to negotiate it up front (in
            IKEv2) since it is a static property of the endpoints,
            rather than discovering it in-band via error responses.

             

            --Ben Schwartz



            From: Daniel Migault <[email protected]>
            Sent: Friday, July 28, 2023 10:47 AM
            To: Ben Schwartz <[email protected]>
            Subject: Re: [IPsec] -ikev2-mtu-dect: IKEv2 PTB
            Notification

             

            I see the next link as being the network behind the
            egress security gateway in which case the paquet would be
            the clear text packet. In that case maybe we could expect
            a ICMP PTB being sent to the source. The scenario we have
            is the packet

            I see the next link as being the network behind the
            egress security gateway in which case the paquet would be
            the clear text packet. In that case maybe we could expect
            a ICMP PTB being sent to the source. 

            The scenario we have is the packet being so big that
            decryption cannot be performed - for example once
            reassembled. The egress security gateway has an ESP
            packet that it cannot process. The normal way would be to
            send an ICMP PTB but that ICMP PTB does not contain
            sufficient information for the egress to address the
            issue. The IKE message could be seen as duplicating the
            ICMP PTB with additional guarantees.

             

            Yours, 
            Daniel

             

            On Fri, Jul 28, 2023 at 1:33 AM Ben Schwartz <
            [email protected]> wrote:

                I don't understand what it would mean for an ESP
                packet to be "too big to be decrypted".  Do you mean
                that the decrypted payload is too big to deliver on
                the next link?

                 

                --Ben Schwartz



                From: IPsec <[email protected]> on behalf of
                Daniel Migault <[email protected]>
                Sent: Thursday, July 27, 2023 9:32 PM
                To: IPsecME WG <[email protected]>
                Subject: [IPsec] -ikev2-mtu-dect: IKEv2 PTB
                Notification

                 

                In yesterday's presentation of the -ikev2-mtu-dect
                draft, I was asked why do we have such a notification
                instead of using a standard ICMP PTB message
                encapsulated in ESP.   I believe the confusion comes
                from me saying that the PTB message

                In yesterday's presentation of the -ikev2-mtu-dect
                draft, I was asked why do we have such a notification
                instead of using a standard ICMP PTB message
                encapsulated in ESP. 

                 

                I believe the confusion comes from me saying that the
                PTB message is sent AFTER the packet has been
                decrypted. This is not the case as the PTB is sent
                BECAUSE the encrypted packet is too big and so cannot
                be decrypted. In other words the packet that is
                too big is the ESP packet. 

                 

                If the packet is too big and cannot be decrypted a
                Packet Too Big Notification (PTB) that specifies the
                Link MTU (LMTU) of the router component of the egress
                node (on network N) as well as the effective MTU to
                receive (EMTU_R). Both are configuration parameters. 
                An ICMP PTB message may also be sent by the egress
                node. Note that this ICMP may not contain even the
                SPI, and so is likely to not carry sufficient
                information to the ingress node, so any action be
                taken. Typically the ICMP message only carries the
                first 8 bytes start from IP header of the original
                packets. This is not sufficient when encapsulated as
                the 8 bytes will not contain the SPI and the egress
                gateway will not be able to identify the concerned SA
                and so the concerned flow. 

                 

                Yours, 
                Daniel


                 

                --

                Daniel Migault

                Ericsson


             

            --

            Daniel Migault

            Ericsson



        --
        Daniel Migault
        Ericsson



    --
    Daniel Migault
    Ericsson

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to