Hi Joe, Could you also clear the not-ready mark in the datatracker?
Thanks, Chris. > On Dec 23, 2020, at 5:33 PM, Joseph Touch <to...@strayalpha.com> wrote: > > Looks good - thanks. > > Joe > >> On Dec 19, 2020, at 8:44 PM, Christian Hopps <cho...@chopps.org >> <mailto:cho...@chopps.org>> wrote: >> >> Hi Joe, >> >> Thanks so much for your review and feedback. I have just published a new >> version of the draft that I believe covers the concerns you raised in the >> review. >> >> New: https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-05 >> <https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-05> >> Changes: https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-05 >> <https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-05> >> >> Thanks, >> Chris. >> >>> On Dec 19, 2020, at 7:57 PM, Joseph Touch <to...@strayalpha.com >>> <mailto:to...@strayalpha.com>> wrote: >>> >>> >>> >>>> On Dec 19, 2020, at 2:16 PM, Christian Hopps <cho...@chopps.org >>>> <mailto:cho...@chopps.org>> wrote: >>>> >>>> >>>> >>>>> On Dec 4, 2020, at 3:14 AM, Christian Hopps <cho...@chopps.org >>>>> <mailto:cho...@chopps.org>> wrote: >>>> >>>> Looking through this list I realized one thing. We are not technically >>>> defining a new tunnel here. We are defining a new payload for the already >>>> defined IPsec/ESP tunnel. So many of these points are covered by the base >>>> ESP tunnel document. Where we do differ is that we do not pre-fragment >>>> packets (i.e., we do not use IP fragmentation or have a tunnel MTU) on >>>> ingress as the encapsulation supports fragmentation and reassembly by >>>> design of any sized IP packet. This fact is noted in the text while >>>> talking about the DF bit mapping (or lack thereof). >>> >>> It’s the ways in which you differ that need to be addressed. >>> >>>> "IP-TFS never IP fragments the inner packets and the inner packets will >>>> not affect the fragmentation of the outer encapsulation packets." >>> >>> It doesn’t IP fragment, but it does fragment. There are still fragmentation >>> and reassembly considerations as a result. >>> >>>> Do you think I should expand a bit more on that text to anything more >>>> clear? >>> >>> Yes - the point is to explain how much you rely on some properties of ESP >>> to avoid replays and maintain ordering and explain that’s why some of the >>> typical reassembly issues aren’t relevant. But not all.. >>> >>>> >>>>>> There are a number of other tunnel considerations that should be >>>>>> addressed, >>>>>> again as discussed in draft-ietf-intarea-tunnels. These include: >>>> >>>> >>>>>> - The >>>>>> impact of tunnel traversal on the inner hopcount/TTL (there should be >>>>>> none, as >>>>>> per that doc; hopcount should be adjusted by routers, not tunnels) - >>>> >>>> This is covered by IPsec >>>> (https://tools.ietf.org/html/rfc4301#section-5.1.2 >>>> <https://tools.ietf.org/html/rfc4301#section-5.1.2> section 5.1.2.1 in >>>> particular). >>> >>> It should be noted as how that impacts the methods of this doc. >>> >>>>>> Impact of errors in the tunnel on the ingress >>>> >>>> What would you suggest saying about this? Broadly I'm thinking "errors in >>>> the tunnel will affect inner packet delivery?" Seems a bit obvious so I >>>> think I may be missing what your after. >>> >>> You should describe how you expect ICMP errors arriving at the ingress to >>> be handled when they arise because of a packet traversing the tunnel. If >>> it’s “how ESP handles it”, fine, but mention that. >>> >>>>>> - Specification of the >>>>>> EMTU_R of the tunnel itself, and how that is determined - >>>> >>>> There is no maximum, all IP packet sizes are supported. :) >>> >>> OK, then mention that. It’s different from the EMTU_R of ESP, for example. >>> >>>>>> What the >>>>>> ingress should do if an incoming packet exceeds EMTU_R - It should >>>>>> be >>>>>> noted that this is a unicast tunnel - What you expect if there are >>>>>> multiple paths between the tunnel ingress and egress - Does the >>>>>> tunnel >>>>>> itself have a flow ID? (if the outer packet is IPv6) If so, is it fixed >>>>>> or >>>>>> intended to vary arbitrarily (and if so, how)? - If the outer >>>>>> packet is >>>>>> IPv4, do you expect to use DF=1? If not, how are you handling ID issues >>>>>> in RFC >>>>>> 6864? If so, it might be useful to add a reminder that the ID can be >>>>>> anything >>>>>> (including constant, which may be useful in avoiding a covert channel). >>>> >>>> We inherit these from the base IPsec/ESP tunnel mechanism that we use. >>> >>> Some of it you do inherit, but others you do not (as you note above). They >>> all need to be addressed. >>> >>> I.e., you’re potentially putting multiple IP packets inside one tunnel >>> packet; what does the header of the tunnel packet look like? You can’t >>> simply say “do what ESP does” because ESP allows only one IP packet as >>> payload. I.e., see Sec 5.1.2.1 - all those values “copied from the inner >>> packet” - how do they work when you have more than one packet and the >>> values vary across those payloads?? >>> >>> That’s the point here - you can definitely say “do what ESP does” when >>> that’s enough, but it’s clearly not. The ways in which you differ need to >>> be spelled out explicitly. >>> >>> Joe >>> >>> _______________________________________________ >>> IPsec mailing list >>> IPsec@ietf.org <mailto:IPsec@ietf.org> >>> https://www.ietf.org/mailman/listinfo/ipsec >>> <https://www.ietf.org/mailman/listinfo/ipsec> >> _______________________________________________ >> Tsv-art mailing list >> tsv-...@ietf.org <mailto:tsv-...@ietf.org> >> https://www.ietf.org/mailman/listinfo/tsv-art > > _______________________________________________ > IPsec mailing list > IPsec@ietf.org > https://www.ietf.org/mailman/listinfo/ipsec
signature.asc
Description: Message signed with OpenPGP
_______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec