Re: [DNSOP] bar bof, edns buffer size, avoid fragmentation

william manning <chinese.apricot@gmail.com> Thu, 25 July 2019 06:47 UTC

Return-Path: <chinese.apricot@gmail.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DE66120357 for <dnsop@ietfa.amsl.com>; Wed, 24 Jul 2019 23:47:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kHKxrYqB53Ik for <dnsop@ietfa.amsl.com>; Wed, 24 Jul 2019 23:47:00 -0700 (PDT)
Received: from mail-yw1-xc33.google.com (mail-yw1-xc33.google.com [IPv6:2607:f8b0:4864:20::c33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1952120355 for <dnsop@ietf.org>; Wed, 24 Jul 2019 23:47:00 -0700 (PDT)
Received: by mail-yw1-xc33.google.com with SMTP id m16so18903542ywh.12 for <dnsop@ietf.org>; Wed, 24 Jul 2019 23:47:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=yet/ZDaWVYH+7xrZaloV7DaZ12TzFbnz4pOVE1OaKPQ=; b=PV6yKBP9waDQtai89ukpB/OQhOjszo1YQqAQSYnfYoQ3t2UdZv+PYPGrNVgdfOpEks 2T9A6ssxCkEaPjnjGvIw/7vo1JO1l93d1zY6HB7ytgfYDngV5y5EuZBujV6zVu3v9arc P5HB1Gm2AJRP4DIsFo5mL98ISGuJ0mcSiI/RB1xBvxLaQrv3RkQs7eMxl8wvnWKJ8kdy 9elUamsokoUTJqh+VZdCrMQ0G1HtWQeNNwT9Noi+MJoMhc8BZ2B4aBZj5LdD67sFw8l1 avsnQDoHzGSgrkReF7WCGz2eciRst1pYXqa34xI8juwdejlp6zPRP/R2GJmqaxZGH5ys iTGg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=yet/ZDaWVYH+7xrZaloV7DaZ12TzFbnz4pOVE1OaKPQ=; b=AEp7hGFWPUsTiB+R2cXsMcEXGHJ8DJdZfOf0RhGLn0eg/Ho72OBwtjYRFNJG12Z+/v ZElsipTILx1zo35pCyfcH7+kai0g5DfwzwBtPhzWluDe0ltA3V0L5X6bqnOLCbs8Ahsi ZJAxzCVmEYWTjM6/0YjGgqsPdX1SMKTZrX3MV7sKqtP9OPOb57UFXaOkkMFYKFfs6Cnr pqSj3DU706NhwYlZqh6ZP7fMuTerF4Az1x3RxpoR1P2NeqmzAI5T9qA2evjTjGZATTRe MEetHdcB6WDxpq7nWuP5NydrC2essC+tuspVWg3I7oTwy9xUqibKBkuGiFpWBPXHW3ZF gTkg==
X-Gm-Message-State: APjAAAXCeZ933XYCH/Ub82iYsUiSSRA1vGAHHTnj+w/0vIFac90lyltN CeZu6qRBxITr1vIOx8sfDpxXLv4M/JHVcu0Fi68=
X-Google-Smtp-Source: APXvYqyHYU6qoaHTF+7CsUb7vZh5bOVZfsH+wW3wpgtKiQNEAL8YZlg17Opch4XGhrtAhUbQs81RrDdXsdQ/XGaqQfI=
X-Received: by 2002:a0d:df50:: with SMTP id i77mr52385332ywe.59.1564037219822; Wed, 24 Jul 2019 23:46:59 -0700 (PDT)
MIME-Version: 1.0
References: <922546a1-a7a4-45fa-b4a7-e861f3a425d2@redbarn.org> <8410065.5GvUleY1HB@linux-9daj> <14483517.zoDt3jd3KM@linux-9daj> <10714332.QXc9afUW1Z@linux-9daj>
In-Reply-To: <10714332.QXc9afUW1Z@linux-9daj>
From: william manning <chinese.apricot@gmail.com>
Date: Wed, 24 Jul 2019 23:46:48 -0700
Message-ID: <CACfw2hhjJmmOciEz2KWHX9MaApM5NfqJ_efyMV9Pz8iLTsEaGw@mail.gmail.com>
To: Paul Vixie <paul@redbarn.org>
Cc: dnsop <dnsop@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e72f50058e7bcae6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/36cGDaNfe3_aWMAO7w5_lM3P1DU>
Subject: Re: [DNSOP] bar bof, edns buffer size, avoid fragmentation
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2019 06:47:03 -0000

sounds like a delightful session with some productive ideas.


On Wed, Jul 24, 2019 at 5:23 PM Paul Vixie <paul@redbarn.org> wrote:

> one other matter emerged during this discussion. path mtu discovery is
> dead at
> the moment, for valid security reasons. however, a jumbogram sized campus
> can
> be described in static routes, using MTU 1500 only for "default". and
> also,
> any future path mtu discovery functions will, as in the past, simply
> create
> "host routes" (/32 or /128) to memorialize the MTU known for that host,
> since
> that is where the TCP MSS computation will expect to find it. so, the lack
> of
> path mtu discovery in today's networks does not invalidate the method of
> calculating TCP MSS from the route MTU; thus, this should be safe for EDNS
> buffer size as well.
>
> paul
>
> re:
>
> On Thursday, 25 July 2019 00:19:18 UTC Paul Vixie wrote:
> > with four of us in attendance monday evening, i presented my appreciation
> > for fujimora-san's draft and admitted that EDNS0 ought to have required
> DF
> > and ought to have used examples which would fit in a then-common MTU 1500
> > network.
> >
> > i then asked that numbers like 1220, 1280, 576, and 1500 not be
> specified as
> > fixed constants, but rather, should be computed in the same way and for
> the
> > same reasons as TCP MSS. those of us running jumbograms or still running
> > FDDI or perhaps speaking POS should not be artificially limited in our
> DNS
> > payload sizes.
> >
> > in discussion, the following details appeared:
> >
> > TCP MSS is calculated from the routing table. on microsoft windows,
> there's
> > an easy way to find the route for a destination...
> >
> >
> https://docs.microsoft.com/en-us/windows/win32/rras/search-for-the-best-rout
> > e
> >
> > ....and while there's no portable way to do this from user mode in Linux
> or
> > BSD or other UNIX-style systems such as Android, there is always a way.
> >
> > it is the route's MTU and not any one interface's MTU, and not any
> constant,
> > that should be used to calculate EDNS0 buffer size. that will probably be
> > 1280 or 1220 for most V6 routes (including "default", the route of last
> > resort) and 1460 for most V4 routes (including default).
> >
> > (noting, i've made a similar plea to the QUIC team. the 1500 MTU will not
> > last our lifetimes, and we must not hard code the 1500 MTU assumption...
> > anywhere.)
> >
> > also, there were beer and snacks.
>
>
> --
> Paul
>
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>