Re: Is Fragmentation at IP layer even needed ?

Fernando Gont <fgont@si6networks.com> Wed, 10 February 2016 08:55 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A2211A01F7 for <ietf@ietfa.amsl.com>; Wed, 10 Feb 2016 00:55:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dkED0cT1i720 for <ietf@ietfa.amsl.com>; Wed, 10 Feb 2016 00:55:32 -0800 (PST)
Received: from fgont.go6lab.si (fgont.go6lab.si [IPv6:2001:67c:27e4::14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C52D41A01F9 for <ietf@ietf.org>; Wed, 10 Feb 2016 00:55:31 -0800 (PST)
Received: from [192.168.3.107] (unknown [181.165.125.191]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 0DD11206A48; Wed, 10 Feb 2016 09:55:27 +0100 (CET)
Subject: Re: Is Fragmentation at IP layer even needed ?
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>, ietf@ietf.org
References: <CAOJ6w=EvzE3dM4Y2mFFR=9YyPBdmFu_jkF4-42LjkdbRd3yz_w@mail.gmail.com> <BLUPR05MB1985F5F2BB3118362C67B921AED50@BLUPR05MB1985.namprd05.prod.outlook.com> <20160208200943.A615941B5B96@rock.dv.isc.org> <CAMm+LwgLoYpQ1TNOTOuJzh+cu+GyRBf9=y_K7K35boQ9WcZKjA@mail.gmail.com> <56B92A96.9050200@si6networks.com> <CAMm+LwifTXvVd1mPZOfcOOR03Fnj-82H9aDVS01=wGezePtnXw@mail.gmail.com> <56BA4BC7.1010002@isi.edu> <CAMm+Lwi-n=be4AWGibs+Zq9egYw5pSDmPGb-4P0LDEcX1E6osA@mail.gmail.com> <56BA68CE.7090304@isi.edu> <56BAD346.6090601@necom830.hpcl.titech.ac.jp> <56BAE126.5050302@si6networks.com> <56BAEBC6.3050003@necom830.hpcl.titech.ac.jp>
From: Fernando Gont <fgont@si6networks.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <56BAF3F5.8030709@si6networks.com>
Date: Wed, 10 Feb 2016 05:25:25 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1
MIME-Version: 1.0
In-Reply-To: <56BAEBC6.3050003@necom830.hpcl.titech.ac.jp>
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/YbyiBcp-z9lM5-LeUGe5dwwXoGk>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Feb 2016 08:55:34 -0000

Hi,

On 02/10/2016 04:50 AM, Masataka Ohta wrote:
[....]

>>> The reality is that wise operators denied deployment of
>>> stupid idea of extension headers including that for IP
>>> reassembly.
> 
>>> Wrong. The worst kind of obscurity is a transport header at
>>> the end of a chain of 1000 or more IPv6 extension headers.
>>>
>>> Note that the transport header may not be placed in the
>>> first fragment.
> 
>> RFC7112 imposes some basic constraints: the entire EH chain must be
>> present in the first fragment.
> 
> Thank you for the information. But, I'm afraid the fix is too late
> and too insufficient to change the reality above. That is, my point
> on DOS is still valid and, worse, some combination of extension
> headers may results in yet unnoticed vulnerability, which is
> partially why allowing extension headers is a stupid thing to do.
> 
> Moreover, the rfc should also limit header chain length below
> 256B or so.

I tried that in 6man, but there was opposition to my proposal at the time.


> Though DNS message over UDP over IPv4, with 576B
> reassembly buffer, can be 508B (in practice, 548B) long, DNS
> message over UDP over IPv6, with 1280B reassembly buffer,
> can be less than 100B, if header chain is lengthy.

Agreed.



> Worse, though the rfc require an entire upper layer header
> included in the first fragment, the requirement is too much.

Not sure what you mean.



> According to rfc792, the first 8B should be enough. As for
> ICMPv6, ICMPv6 should also be required to contain all the
> header chain up to the first 8B of an upper layer header.

... which may not be feasible if a long EH chain is employed in the
packet that generated the error message.

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492