Greetings,

The I-D "Controlling IP Fragmentation on Common Platforms
<https://datatracker.ietf.org/doc/html/draft-seemann-tsvwg-udp-fragmentation>,"
targeted as an information RFC, was presented in a recent IETF 122 tsvwg
session and is under consideration for adoption in that working group.

At least one of the findings reported therein has a bearing on
Recommendation R2 in Section 3.1 of RFC 9715
<https://datatracker.ietf.org/doc/html/rfc9715#name-proposed-recommendations-fo>
:

Linux systems do not expose a direct API for this purpose and require the
use of Path MTU socket options (IP_MTU_DISCOVER) to manage fragmentation
settings. However, it is important to note that enabling IPv4 Path MTU
Discovery for UDP in current Linux versions is considered harmful and
dangerous. For more details, see Appendix C
<https://datatracker.ietf.org/doc/html/rfc9715#impl>.

This may already be out-of-date, given what I see in Section 3.1
<https://datatracker.ietf.org/doc/html/draft-seemann-tsvwg-udp-fragmentation#name-linux>
of
the aforementioned draft:

PMTUD behavior is controlled via the IP_MTU_DISCOVER and IPV6_MTU_DISCOVER
socket options at the IPPROTO_IP and IPPROTO_IPV6 levels. There are two
closely related values: For IPv4, both IP_PMTUDISC_DO and IP_PMTUDISC_PROBE
enable setting the DF bit. For IPv6, both IPV6_PMTUDISC_DO and
IPV6_PMTUDISC_PROBE prevent fragmentation by the sender.¶
<https://datatracker.ietf.org/doc/html/draft-seemann-tsvwg-udp-fragmentation#section-3.1-1>

The difference between the former and the latter is that the former
instructs the kernel to process ICMP "Fragmentation Needed" messages, while
the latter does not.¶
<https://datatracker.ietf.org/doc/html/draft-seemann-tsvwg-udp-fragmentation#section-3.1-2>
This point may be worth considering when and if RFC 9715 is updated from
Information to RFC.

Thanks and regards,

Mike Heard

On Mon, May 6, 2024 at 6:59 AM Petr Špaček wrote:

> Hello dnsop,
>
> Warren asked implementers to provide feedback on the current text, so
> I'm doing just that.
>
[ ... ]

> On 01. 03. 24 3:54, internet-dra...@ietf.org wrote:
> > Internet-Draft draft-ietf-dnsop-avoid-fragmentation-17.txt is now
> available.
> > It is a work item of the Domain Name System Operations (DNSOP) WG of the
> IETF.
> >
> >     Title:   IP Fragmentation Avoidance in DNS over UDP
> >     Authors: Kazunori Fujiwara
> >              Paul Vixie
> >     Name:    draft-ietf-dnsop-avoid-fragmentation-17.txt
> >     Pages:   14
> >     Dates:   2024-02-29
> >

[ ... ]

>
> > R2. Where supported, UDP responders SHOULD set IP "Don't Fragment flag
> (DF) bit" [RFC0791] on IPv4. At the time of writing, most DNS server
> software did not set the DF bit for IPv4, and many operating systems'
> kernels constraint make it difficult to set the DF bit in all cases.
>
> E.g. on Linux socket API does not expose DF bit directly. Application
> can request DF bit to be turned on in outgoing packets but at the same
> time this implicitly enables receipt and processing of unauthenticated
> ICMP messages. These messages can be used to manipulate Path MTU records
> in the kernel and mount attacks misusing this technique.
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to