Hi Mark,

> -----Original Message-----
> From: Mark Andrews [mailto:ma...@isc.org]
> Sent: Wednesday, August 07, 2013 4:56 PM
> To: Templin, Fred L
> Cc: Doug Barton; ipv6@ietf.org
> Subject: Re: UDP+Fragmentation
> 
> 
> In message <2134F8430051B64F815C691A62D983180E1E06@XCH-BLV-
> 504.nw.nos.boeing.co
> m>, "Templin, Fred L" writes:
> > Hi Mark,
> >
> > > -----Original Message-----
> > > From: Mark Andrews [mailto:ma...@isc.org]
> > > Sent: Wednesday, August 07, 2013 2:54 PM
> > > To: Templin, Fred L
> > > Cc: Doug Barton; ipv6@ietf.org
> > > Subject: Re: UDP+Fragmentation
> > >=20
> > >=20
> > > In message <2134F8430051B64F815C691A62D983180E170A@XCH-BLV-
> > > 504.nw.nos.boeing.co
> > > m>, "Templin, Fred L" writes:
> > > > Hi Mark,
> > > >
> > > > > -----Original Message-----
> > > > > From: Mark Andrews [mailto:ma...@isc.org]
> > > > > Sent: Tuesday, August 06, 2013 7:32 PM
> > > > > To: Templin, Fred L
> > > > > Cc: Doug Barton; ipv6@ietf.org
> > > > > Subject: Re: UDP+Fragmentation
> > > > >=3D20
> > > > >=3D20
> > > > > In message <2134F8430051B64F815C691A62D983180E0E2C@XCH-BLV-
> > > > > 504.nw.nos.boeing.com>, "Templin, Fred L" writes:
> > > > > > > On 08/06/2013 03:07 PM, Templin, Fred L wrote:
> > > > > > > > If we are going to define a new protocol type, let's
> define
> > > one
> > > > > > > > that addresses everything we are currently struggling
> with
> > > and
> > > > > > > > has the extensibility to address additional requirements
> > > moving
> > > > > > > > forward into the future.
> > > > > > >
> > > > > > > So in other words let's make all the same mistakes we made
> with
> > > the
> > > > > > > design of IPv6?  :)
> > > > > >
> > > > > > Not even. This is about fixing and atoning for mistakes; not
> > > > > > introducing new ones.
> > > > > >
> > > > > > Thanks - Fred
> > > > > > fred.l.temp...@boeing.com
> > > > > > -------------------------------------------------------------
> ----
> > > ---
> > > > > > IETF IPv6 working group mailing list
> > > > > > ipv6@ietf.org
> > > > > > Administrative Requests:
> > > https://www.ietf.org/mailman/listinfo/ipv6
> > > > > > -------------------------------------------------------------
> ----
> > > ---
> > > > >=3D20
> > > > > There are several issues with getting fragments through
> firewalls.
> > > > > My draft addresses one of them.
> > > > >=3D20
> > > > > Putting all the headers into the initial fragment is another
> part
> > > > > of fix / reducing the issue.  If you don't do something like
> that
> > > > > firewall will drop initial fragments because that can't be
> expected
> > > > > to reassemble unless they are doing DPI.
> > > > >=3D20
> > > > > Making fragment sizes more even is yet another part of the
> issue.
> > > > >=3D20
> > > > > Allowing tunnel entry points to re-fragment fragments is yet
> > > another
> > > > > part of the solution space.
> > > >
> > > > In these points, you are making a good case for SEAL.
> > >=20
> > > And all those changes are independent of a SEAL header.  They are
> > > changes to the fragmentation algorithm.
> >
> > But, an attacker does not need to implement the changes to the
> > fragmentation algorithm in order to be compliant with the specs.
> >
> > > SEAL has a big drawback.  SEAL requires then tunnel endpoint /
> > > destination node to understand SEAL.
> >
> > Right that the destination needs to understand SEAL.
> >
> > > My draft does not require any other node to understand the option.
> > > You can start sending packets with the option immediately and they
> > > should be passed by nodes that are not aware of what it does.
> > > Destination nodes can process the fragments without knowning the
> > > contents.  This is no more dangerous than processing fragmented
> > > traffic without the option if you are already passing fragments.
> >
> > But, does it address the tiny fragment attack profile that Ron's
> > draft is concerned with? And will it be robust as more and more
> > operators unconditionally drop IP fragments?
> 
> Fred, you are missing the point.  You don't need a single ominbus
> draft.  One can have multiple drafts that address different points.

You know, I was thinking pretty much the same thing on my way
into work today. SEAL didn't set out to address transport mode,
and until the most recent version left it as "out of scope".
I'm willing to believe that an incrementally deployable approach
such as what you are describing could address transport-specific
requirements. 

> Your arguement is that it is not a omnibus draft.  It didn't set
> out to be a omnibus draft.

OK.

> Today legitimate IPv6 nodes send fragments no smaller than 1280
> unless the first hop is being mapped to IPv4 at the sending node
> and the IPv4 mtu is less than 1280.  1280 bytes contains the full
> header chain unless someone is launching a attack.
> 
> Today firwalls drop fragments that don't have enough information
> in them to work out if the non-initial fragment can pass without
> passing all fragments.  The initial fragment is dropped because the
> firewall operator knows it is pointless to send it despite there
> being enough information.
> 
> If attackers sends tiny fragments they will continue to be dropped
> with or without this option as the firewall doesn't have enough
> information to make the decision in the initial fragment.  Legitimate
> initial fragment however can now be let through as the firewall
> knows that the other fragments will have the necessary information.
> Other fragments can be let through with this option as the firewall
> will pass the legitimate initial fragment.

But, is the firewall going to do any bounds checking on the
fragmentation offset? Asked another way, is there still an
overlapping fragment attack profile to be concerned with?
 
> Attackers now have to find the slot/pinhole to send attack traffic
> through instead of just letting through all fragments. 
>
> Mark
> 
> > > The key difference is HEADER vs OPTION.
> >
> > That's right, but without a new header there is no means to probe
> > the path MTU or even to ping the destination to see if it is up
> > as part of the protocol.

This is one part that still concerns me a bit. Sure, the
application can simply fragment everything larger than 1280
but wouldn't it be better to have an assured path MTU so it
knows whether it can suspend the fragmentation process? I'm
thinking of RFC4821 applied to UDP and/or to specific app's.

Thanks - Fred
fred.l.temp...@boeing.com

> > Plus, we need a multiple-part solution
> > that not only addresses transport-mode UDP fragmentation but also
> > tunnel-mode operation for tunnels that would otherwise be
> > susceptible to MTU issues.
> >
> > Thanks - Fred
> > fred.l.temp...@boeing.com
> >
> > > Mark
> > >=20
> > > > Thanks - Fred
> > > > fred.l.temp...@boeing.com
> > > >
> > > > > Mark
> > > > > --
> > > > > Mark Andrews, ISC
> > > > > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > > > > PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org
> > > --
> > > Mark Andrews, ISC
> > > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > > PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to