Most (all) DNS servers use IP_PMTUDISC_OMIT[1] on Linux which makes sockets ignore PMTU information and send packets with DF=0, looks like the draft is incomplete in this regard.
The options is available since Linux 3.15. 1. https://lists.openwall.net/netdev/2014/02/26/4 Ondrej -- Ondřej Surý (He/Him) ond...@isc.org My working hours and your working hours may be different. Please do not feel obligated to reply outside your normal working hours. > On 21. 3. 2025, at 9:05, C. M. Heard <he...@pobox.com> wrote: > > Greetings, > > The I-D "Controlling IP Fragmentation on Common Platforms," targeted as an > information RFC, was presented in a recent IETF 122 tsvwg session and is > under consideration for adoption in that working group. > > At least one of the findings reported therein has a bearing on Recommendation > R2 in Section 3.1 of RFC 9715: > Linux systems do not expose a direct API for this purpose and require the use > of Path MTU socket options (IP_MTU_DISCOVER) to manage fragmentation > settings. However, it is important to note that enabling IPv4 Path MTU > Discovery for UDP in current Linux versions is considered harmful and > dangerous. For more details, see Appendix C. > > This may already be out-of-date, given what I see in Section 3.1 of the > aforementioned draft: > PMTUD behavior is controlled via the IP_MTU_DISCOVER and IPV6_MTU_DISCOVER > socket options at the IPPROTO_IP and IPPROTO_IPV6 levels. There are two > closely related values: For IPv4, both IP_PMTUDISC_DO and IP_PMTUDISC_PROBE > enable setting the DF bit. For IPv6, both IPV6_PMTUDISC_DO and > IPV6_PMTUDISC_PROBE prevent fragmentation by the sender.¶ > The difference between the former and the latter is that the former instructs > the kernel to process ICMP "Fragmentation Needed" messages, while the latter > does not.¶ > This point may be worth considering when and if RFC 9715 is updated from > Information to RFC. > > Thanks and regards, > > Mike Heard > > On Mon, May 6, 2024 at 6:59 AM Petr Špaček wrote: > Hello dnsop, > > Warren asked implementers to provide feedback on the current text, so > I'm doing just that. > [ ... ] > On 01. 03. 24 3:54, internet-dra...@ietf.org wrote: > > Internet-Draft draft-ietf-dnsop-avoid-fragmentation-17.txt is now available. > > It is a work item of the Domain Name System Operations (DNSOP) WG of the > > IETF. > > > > Title: IP Fragmentation Avoidance in DNS over UDP > > Authors: Kazunori Fujiwara > > Paul Vixie > > Name: draft-ietf-dnsop-avoid-fragmentation-17.txt > > Pages: 14 > > Dates: 2024-02-29 > > > [ ... ] > > > R2. Where supported, UDP responders SHOULD set IP "Don't Fragment flag (DF) > > bit" [RFC0791] on IPv4. At the time of writing, most DNS server software > > did not set the DF bit for IPv4, and many operating systems' kernels > > constraint make it difficult to set the DF bit in all cases. > > E.g. on Linux socket API does not expose DF bit directly. Application > can request DF bit to be turned on in outgoing packets but at the same > time this implicitly enables receipt and processing of unauthenticated > ICMP messages. These messages can be used to manipulate Path MTU records > in the kernel and mount attacks misusing this technique. > _______________________________________________ > DNSOP mailing list -- dnsop@ietf.org > To unsubscribe send an email to dnsop-le...@ietf.org
signature.asc
Description: Message signed with OpenPGP
_______________________________________________ DNSOP mailing list -- dnsop@ietf.org To unsubscribe send an email to dnsop-le...@ietf.org