Hi, Bjoern,

On 01/02/2012 07:10 PM, Bjoern A. Zeeb wrote:
> Contrary to how a lot of people seem to read RFC 2460, especially the last
> paragraph of section 5 (also subject to Florian's Errata 2843), I basically
> read (in) the past:
> 
> 4.5 "The Fragment header is used by an IPv6 source to send a packet larger
>    than would fit in the path MTU to its destination."  
> 
> ``You shall not add a fragment header unless you really need to''.

Well, it's supposedly (specs-wise) also used to help translating devices
in the fragmentation of packets...


> The only way you must add a fragment header for a packet size below 1280 is
> when it is a packet going to a v4 destination (i.e. say through NAT64 these
> days).  How you can track this (if you can) and how you get that information
> is beyond the scope of 2460 but you need to know to be able to.  Otherwise
> you shall not.

That's not what the specs state. The specs say that if you receive an
ICMPv6 PTB advertising an MTU <= you need not fragment, but should
include a fragment header.


> This is the reason ipfw originally dropped what people now seem to call
> "atomic fragments".

Well, it's a useful short-hand for "packets that hace a fragment offset
of zero and for which the M bit is not set".. ;-)



> When I PR started to look at the PR I consulted briefly with Bob and the
> outcome of the short exchange for me was:
> 
> - the "atomic frags" do not seem to hurt in this particular filtering case
>   and could possibly be allowed.

Atomic fragments could be safely processed as if they were not
fragmented traffic at all... see the I-D we published...


> While I still feel that these "atomic frags" should be sent to the packet
> shredder on first sight it seemed to match reality (and especially
> operational impact) better.  However I left a sysctl for individuals to
> control their preference.

ANy comments regarding processing them as non-fragmented traffic, as
noted in draft-gont-6man-ipv6-atomic-fragments ?



> Another thing on the "atomic frags" I was (partly) shown was that they seemed
> to have a length in the 50 octets size which would even be way below other
> minimums.  So I am really not feeling too confident that it's not just silly
> stacks or software bugs and it would really be thrilling if people could 
> figure
> out OS and version and reason why some systems send them.

Well I'm certainly am after that. However, the point is that we need not
over-engineer this one: these atomic fraggments could be safely
processed without running into the typical IP fragmentation issues...



> On the entire "fragmentation related security issues" topic, I feel we are
> seriously heading into wrong directions to just more complications rather than
> simplifications.
> 
> The idea of having the fragment offset to stay compatible the way things 
> worked
> in IPv4 certainly was a great idea and has later proven to be a PITA.  What 
> I'd
> really like to have is a silly fragment counter 1..n, so no overlapping 
> possible
> (and not just not allowed on paper anymore as that does not remove that code
> to check from the stacks), simple handling of duplicate fragments, and no
> "atomic frags" allowed.

That makes a bunch of IP fragmentation attacks (mostly DoS) trivial...
-- we should have learnt the leason from IPv4, shouldn't we?


> Luckily the fragment header still has a lot of spare space that could allow
> to indicate which scheme is used and dropping a packet unless a bit is set
> (not being set indicating the old scheme) is really easy to implement, esp.
> after a transition period and ripping the old code out would be as well 
> then;-)
> I 'd really not want to add even more complicated house keeping and stuff
> long term.

You're already in a complicated position as a result of predictable I-Ds

OpenBSD randomized them, OpenSolaris implemented the scheme that is
descrivbed in the I-D I published... what's the big deal about it?

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492



--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to