Looks good - thanks. Joe
> On Dec 19, 2020, at 8:44 PM, Christian Hopps <cho...@chopps.org> wrote: > > Hi Joe, > > Thanks so much for your review and feedback. I have just published a new > version of the draft that I believe covers the concerns you raised in the > review. > > New: https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-05 > <https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-05> > Changes: https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-05 > <https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-05> > > Thanks, > Chris. > >> On Dec 19, 2020, at 7:57 PM, Joseph Touch <to...@strayalpha.com >> <mailto:to...@strayalpha.com>> wrote: >> >> >> >>> On Dec 19, 2020, at 2:16 PM, Christian Hopps <cho...@chopps.org >>> <mailto:cho...@chopps.org>> wrote: >>> >>> >>> >>>> On Dec 4, 2020, at 3:14 AM, Christian Hopps <cho...@chopps.org >>>> <mailto:cho...@chopps.org>> wrote: >>> >>> Looking through this list I realized one thing. We are not technically >>> defining a new tunnel here. We are defining a new payload for the already >>> defined IPsec/ESP tunnel. So many of these points are covered by the base >>> ESP tunnel document. Where we do differ is that we do not pre-fragment >>> packets (i.e., we do not use IP fragmentation or have a tunnel MTU) on >>> ingress as the encapsulation supports fragmentation and reassembly by >>> design of any sized IP packet. This fact is noted in the text while talking >>> about the DF bit mapping (or lack thereof). >> >> It’s the ways in which you differ that need to be addressed. >> >>> "IP-TFS never IP fragments the inner packets and the inner packets will not >>> affect the fragmentation of the outer encapsulation packets." >> >> It doesn’t IP fragment, but it does fragment. There are still fragmentation >> and reassembly considerations as a result. >> >>> Do you think I should expand a bit more on that text to anything more clear? >> >> Yes - the point is to explain how much you rely on some properties of ESP to >> avoid replays and maintain ordering and explain that’s why some of the >> typical reassembly issues aren’t relevant. But not all.. >> >>> >>>>> There are a number of other tunnel considerations that should be >>>>> addressed, >>>>> again as discussed in draft-ietf-intarea-tunnels. These include: >>> >>> >>>>> - The >>>>> impact of tunnel traversal on the inner hopcount/TTL (there should be >>>>> none, as >>>>> per that doc; hopcount should be adjusted by routers, not tunnels) - >>> >>> This is covered by IPsec (https://tools.ietf.org/html/rfc4301#section-5.1.2 >>> <https://tools.ietf.org/html/rfc4301#section-5.1.2> section 5.1.2.1 in >>> particular). >> >> It should be noted as how that impacts the methods of this doc. >> >>>>> Impact of errors in the tunnel on the ingress >>> >>> What would you suggest saying about this? Broadly I'm thinking "errors in >>> the tunnel will affect inner packet delivery?" Seems a bit obvious so I >>> think I may be missing what your after. >> >> You should describe how you expect ICMP errors arriving at the ingress to be >> handled when they arise because of a packet traversing the tunnel. If it’s >> “how ESP handles it”, fine, but mention that. >> >>>>> - Specification of the >>>>> EMTU_R of the tunnel itself, and how that is determined - >>> >>> There is no maximum, all IP packet sizes are supported. :) >> >> OK, then mention that. It’s different from the EMTU_R of ESP, for example. >> >>>>> What the >>>>> ingress should do if an incoming packet exceeds EMTU_R - It should >>>>> be >>>>> noted that this is a unicast tunnel - What you expect if there are >>>>> multiple paths between the tunnel ingress and egress - Does the >>>>> tunnel >>>>> itself have a flow ID? (if the outer packet is IPv6) If so, is it fixed or >>>>> intended to vary arbitrarily (and if so, how)? - If the outer >>>>> packet is >>>>> IPv4, do you expect to use DF=1? If not, how are you handling ID issues >>>>> in RFC >>>>> 6864? If so, it might be useful to add a reminder that the ID can be >>>>> anything >>>>> (including constant, which may be useful in avoiding a covert channel). >>> >>> We inherit these from the base IPsec/ESP tunnel mechanism that we use. >> >> Some of it you do inherit, but others you do not (as you note above). They >> all need to be addressed. >> >> I.e., you’re potentially putting multiple IP packets inside one tunnel >> packet; what does the header of the tunnel packet look like? You can’t >> simply say “do what ESP does” because ESP allows only one IP packet as >> payload. I.e., see Sec 5.1.2.1 - all those values “copied from the inner >> packet” - how do they work when you have more than one packet and the values >> vary across those payloads?? >> >> That’s the point here - you can definitely say “do what ESP does” when >> that’s enough, but it’s clearly not. The ways in which you differ need to be >> spelled out explicitly. >> >> Joe >> >> _______________________________________________ >> IPsec mailing list >> IPsec@ietf.org <mailto:IPsec@ietf.org> >> https://www.ietf.org/mailman/listinfo/ipsec >> <https://www.ietf.org/mailman/listinfo/ipsec> > _______________________________________________ > Tsv-art mailing list > tsv-...@ietf.org > https://www.ietf.org/mailman/listinfo/tsv-art
_______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec