RFC 9715, Section 3.1, R.2 says:
> UDP responders should configure their systems to prevent fragmentation of
UDP packets when sending replies, provided it can be done safely.

Why don't they use IP_PMTUDISC_PROBE?

On Fri, 21 Mar 2025 at 13:57, Ondřej Surý <ond...@isc.org> wrote:

> Most (all) DNS servers use IP_PMTUDISC_OMIT[1] on Linux which makes
> sockets ignore PMTU information and send packets with DF=0, looks like the
> draft is incomplete in this regard.
>
> The options is available since Linux 3.15.
>
> 1. https://lists.openwall.net/netdev/2014/02/26/4
>
> Ondrej
> --
> Ondřej Surý (He/Him)
> ond...@isc.org
>
> My working hours and your working hours may be different. Please do not
> feel obligated to reply outside your normal working hours.
>
> > On 21. 3. 2025, at 9:05, C. M. Heard <he...@pobox.com> wrote:
> >
> > Greetings,
> >
> > The I-D "Controlling IP Fragmentation on Common Platforms," targeted as
> an information RFC, was presented in a recent IETF 122 tsvwg session and is
> under consideration for adoption in that working group.
> >
> > At least one of the findings reported therein has a bearing on
> Recommendation R2 in Section 3.1 of RFC 9715:
> > Linux systems do not expose a direct API for this purpose and require
> the use of Path MTU socket options (IP_MTU_DISCOVER) to manage
> fragmentation settings. However, it is important to note that enabling IPv4
> Path MTU Discovery for UDP in current Linux versions is considered harmful
> and dangerous. For more details, see Appendix C.
> >
> > This may already be out-of-date, given what I see in Section 3.1 of the
> aforementioned draft:
> > PMTUD behavior is controlled via the IP_MTU_DISCOVER and
> IPV6_MTU_DISCOVER socket options at the IPPROTO_IP and IPPROTO_IPV6 levels.
> There are two closely related values: For IPv4, both IP_PMTUDISC_DO and
> IP_PMTUDISC_PROBE enable setting the DF bit. For IPv6, both
> IPV6_PMTUDISC_DO and IPV6_PMTUDISC_PROBE prevent fragmentation by the
> sender.¶
> > The difference between the former and the latter is that the former
> instructs the kernel to process ICMP "Fragmentation Needed" messages, while
> the latter does not.¶
> > This point may be worth considering when and if RFC 9715 is updated from
> Information to RFC.
> >
> > Thanks and regards,
> >
> > Mike Heard
> >
> > On Mon, May 6, 2024 at 6:59 AM Petr Špaček wrote:
> > Hello dnsop,
> >
> > Warren asked implementers to provide feedback on the current text, so
> > I'm doing just that.
> > [ ... ]
> > On 01. 03. 24 3:54, internet-dra...@ietf.org wrote:
> > > Internet-Draft draft-ietf-dnsop-avoid-fragmentation-17.txt is now
> available.
> > > It is a work item of the Domain Name System Operations (DNSOP) WG of
> the IETF.
> > >
> > >     Title:   IP Fragmentation Avoidance in DNS over UDP
> > >     Authors: Kazunori Fujiwara
> > >              Paul Vixie
> > >     Name:    draft-ietf-dnsop-avoid-fragmentation-17.txt
> > >     Pages:   14
> > >     Dates:   2024-02-29
> > >
> > [ ... ]
> >
> > > R2. Where supported, UDP responders SHOULD set IP "Don't Fragment flag
> (DF) bit" [RFC0791] on IPv4. At the time of writing, most DNS server
> software did not set the DF bit for IPv4, and many operating systems'
> kernels constraint make it difficult to set the DF bit in all cases.
> >
> > E.g. on Linux socket API does not expose DF bit directly. Application
> > can request DF bit to be turned on in outgoing packets but at the same
> > time this implicitly enables receipt and processing of unauthenticated
> > ICMP messages. These messages can be used to manipulate Path MTU records
> > in the kernel and mount attacks misusing this technique.
> > _______________________________________________
> > DNSOP mailing list -- dnsop@ietf.org
> > To unsubscribe send an email to dnsop-le...@ietf.org
>
>
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to