Hi Joe,

Thanks  so much for your review and feedback. I have just published a new 
version of the draft that I believe covers the concerns you raised in the 
review.

New: https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-05 
<https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-05>
Changes: https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-05 
<https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-05>

Thanks,
Chris.

> On Dec 19, 2020, at 7:57 PM, Joseph Touch <to...@strayalpha.com> wrote:
> 
> 
> 
>> On Dec 19, 2020, at 2:16 PM, Christian Hopps <cho...@chopps.org 
>> <mailto:cho...@chopps.org>> wrote:
>> 
>> 
>> 
>>> On Dec 4, 2020, at 3:14 AM, Christian Hopps <cho...@chopps.org 
>>> <mailto:cho...@chopps.org>> wrote:
>> 
>> Looking through this list I realized one thing. We are not technically 
>> defining a new tunnel here. We are defining a new payload for the already 
>> defined IPsec/ESP tunnel. So many of these points are covered by the base 
>> ESP tunnel document. Where we do differ is that we do not pre-fragment 
>> packets (i.e., we do not use IP fragmentation or have a tunnel MTU) on 
>> ingress as the encapsulation supports fragmentation and reassembly by design 
>> of any sized IP packet. This fact is noted in the text while talking about 
>> the DF bit mapping (or lack thereof).
> 
> It’s the ways in which you differ that need to be addressed.
> 
>> "IP-TFS never IP fragments the inner packets and the inner packets will not 
>> affect the fragmentation of the outer encapsulation packets."
> 
> It doesn’t IP fragment, but it does fragment. There are still fragmentation 
> and reassembly considerations as a result.
> 
>> Do you think I should expand a bit more on that text to anything more clear?
> 
> Yes - the point is to explain how much you rely on some properties of ESP to 
> avoid replays and maintain ordering and explain that’s why some of the 
> typical reassembly issues aren’t relevant. But not all..
> 
>> 
>>>> There are a number of other tunnel considerations that should be addressed,
>>>> again as discussed in draft-ietf-intarea-tunnels. These include:
>> 
>> 
>>>> -       The
>>>> impact of tunnel traversal on the inner hopcount/TTL (there should be 
>>>> none, as
>>>> per that doc; hopcount should be adjusted by routers, not tunnels) -
>> 
>> This is covered by IPsec (https://tools.ietf.org/html/rfc4301#section-5.1.2 
>> <https://tools.ietf.org/html/rfc4301#section-5.1.2> section 5.1.2.1 in 
>> particular).
> 
> It should be noted as how that impacts the methods of this doc.
> 
>>>> Impact of errors in the tunnel on the ingress
>> 
>> What would you suggest saying about this? Broadly I'm thinking "errors in 
>> the tunnel will affect inner packet delivery?" Seems a bit obvious so I 
>> think I may be missing what your after.
> 
> You should describe how you expect ICMP errors arriving at the ingress to be 
> handled when they arise because of a packet traversing the tunnel. If it’s 
> “how ESP handles it”, fine, but mention that.
> 
>>>> -       Specification of the
>>>> EMTU_R of the tunnel itself, and how that is determined -
>> 
>> There is no maximum, all IP packet sizes are supported. :)
> 
> OK, then mention that. It’s different from the EMTU_R of ESP, for example.
> 
>>>>       What the
>>>> ingress should do if an incoming packet exceeds EMTU_R -       It should be
>>>> noted that this is a unicast tunnel -       What you expect if there are
>>>> multiple paths between the tunnel ingress and egress -       Does the 
>>>> tunnel
>>>> itself have a flow ID? (if the outer packet is IPv6) If so, is it fixed or
>>>> intended to vary arbitrarily (and if so, how)? -       If the outer packet 
>>>> is
>>>> IPv4, do you expect to use DF=1? If not, how are you handling ID issues in 
>>>> RFC
>>>> 6864? If so, it might be useful to add a reminder that the ID can be 
>>>> anything
>>>> (including constant, which may be useful in avoiding a covert channel).
>> 
>> We inherit these from the base IPsec/ESP tunnel mechanism that we use.
> 
> Some of it you do inherit, but others you do not (as you note above). They 
> all need to be addressed.
> 
> I.e., you’re potentially putting multiple IP packets inside one tunnel 
> packet; what does the header of the tunnel packet look like? You can’t simply 
> say “do what ESP does” because ESP allows only one IP packet as payload. 
> I.e., see Sec 5.1.2.1 - all those values “copied from the inner packet” - how 
> do they work when you have more than one packet and the values vary across 
> those payloads??
> 
> That’s the point here - you can definitely say “do what ESP does” when that’s 
> enough, but it’s clearly not. The ways in which you differ need to be spelled 
> out explicitly.
> 
> Joe
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org <mailto:IPsec@ietf.org>
> https://www.ietf.org/mailman/listinfo/ipsec 
> <https://www.ietf.org/mailman/listinfo/ipsec>

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to