Re: Validation of Packet Too Big Payload using Echo Request

Timothy Winters <twinters@iol.unh.edu> Tue, 28 January 2020 13:39 UTC

Return-Path: <twinters@iol.unh.edu>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 396E0120058 for <ipv6@ietfa.amsl.com>; Tue, 28 Jan 2020 05:39:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=iol.unh.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1cH5uhSI_bA4 for <ipv6@ietfa.amsl.com>; Tue, 28 Jan 2020 05:39:24 -0800 (PST)
Received: from mail-wr1-x433.google.com (mail-wr1-x433.google.com [IPv6:2a00:1450:4864:20::433]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18E3B120073 for <6man@ietf.org>; Tue, 28 Jan 2020 05:39:24 -0800 (PST)
Received: by mail-wr1-x433.google.com with SMTP id w15so16089187wru.4 for <6man@ietf.org>; Tue, 28 Jan 2020 05:39:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iol.unh.edu; s=unh-iol; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=kutaSW3ciWcVLcbsSSG5e5R6SMqM2LjJD0cE2cAkZo0=; b=ei0S45DC1NnmRqlAzm23Vgre+ULHSN/NpllpEswXHtUVmJuamKTPHn3AvCG0hlVNSW KoB3EXXJeVkMbU26e5L5pRLQtwLC7jtTMzhkWIZTMBOizX2OMh23ax/RpXDaYzVHWwNs 71fZAguqGgL0vnLLjRMVuQF+iX9elnHCHBSl8=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=kutaSW3ciWcVLcbsSSG5e5R6SMqM2LjJD0cE2cAkZo0=; b=AA+tqQfESmTQU7pL6UoOJXjTdcWGqdaPXjuy6/6f7TDVTqeTop/J8ev9yxsryizyZT 9pVS76uXwhOJAioWurPPkipSW9mh235AznmVS+eRAdHLMNg1ZKdFBGBvOwrYsF6OE1mY W1rLcNGgmORH+j9X6znMqCyMDPNQdf1cVaEgHeeFuRsp5s6f+6MIC8rr9kYMM4yc9a9D /6MAbBqT9ITznhcnr339LnFpxeJR3vwQvU1JMyHfUofmIwjm9cNQoK/VJN84Nfdscz6E LalalUo/naUhr0SUr46ZXZkYIjMf3m4F2czVuHgDSGk7vfhSsHJkUCp0DYPEQ/xlXNL3 15mg==
X-Gm-Message-State: APjAAAXhJew16u1DsFAjZmBEdS2xRYarRWWnSZwA/K130GlaYknsszeg T/LSnxkIgBMGoPbWFPa9XbfifF10S3w/wa0IxoRKDPSKFc8BQQ==
X-Google-Smtp-Source: APXvYqxxZYwDqw0Ug9p95CAAfehm+9YzRmPnGlcklc3yM4vQMDyO4gwHbANEjMactd0Rg7wo5w4lYAGhCSlLSquMwbo=
X-Received: by 2002:adf:fc4b:: with SMTP id e11mr29763604wrs.326.1580218762302; Tue, 28 Jan 2020 05:39:22 -0800 (PST)
MIME-Version: 1.0
References: <CAOSSMjVzTmCRxLg8k+9t+j0u9iMMWa+T_8P7kVRKGLkiup_jDw@mail.gmail.com> <C4B4C906-88CA-451D-A2D4-63814D0076E6@employees.org>
In-Reply-To: <C4B4C906-88CA-451D-A2D4-63814D0076E6@employees.org>
From: Timothy Winters <twinters@iol.unh.edu>
Date: Tue, 28 Jan 2020 08:39:10 -0500
Message-ID: <CAOSSMjXdiurDTQgFF6=616ZOxUeRvBXeq_33M1zFebEUt6rjMw@mail.gmail.com>
Subject: Re: Validation of Packet Too Big Payload using Echo Request
To: Ole Troan <otroan@employees.org>
Cc: 6MAN <6man@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000feb72a059d335925"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/-sDo4puvyNkNyZN2rb6Dxugv98I>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Jan 2020 13:39:27 -0000

On Tue, Jan 28, 2020 at 3:10 AM <otroan@employees.org> wrote:

> > The IPv6 Ready Logo Committee updated testing to include a test for
> validating the Packet Too Big message content based on the following part
> of 8201.
> >
> > "Nodes should appropriately validate the payload of ICMPv6 PTB
> >    messages to ensure these are received in response to transmitted
> >    traffic (i.e., a reported error condition that corresponds to an IPv6
> >    packet actually sent by the application) per [ICMPv6]."
> >
> > I've included the steps below used to verify the IPv6 implementation
> validates the Packet Too Big.
> >
> > Step
> > Action
> > Expected Behavior
> > 1.
> > TR1 forwards an Echo Request from TN2 to the NUT.  The packet size is
> 1500 octets.
> > The NUT should respond without fragmenting the packet to the Echo
> Request using TR1 as a first hop.
> > 2.
> > TR1 transmits a Packet Too Big message to the NUT with an ICMPv6
> Identifier does not match the Echo Reply in Step 1.
> >
> > 3.
> > TR1 forwards an Echo Request from TN2 to the NUT.  The packet size is
> 1500 octets.
> > The NUT should respond without fragmenting the packet to the Echo
> Request using TR1 as a first hop.
> >
> > We received a comment that this validation shouldn't apply to ICMPv6 and
> it should only apply to TCP or protocols that have state.   Do we think
> this only applies to TCP or is it valid for all traffic?
>
> RFC8201 is a network layer mechanism, and the paragraph above applies to
> all packets sent by the node. Regardless of transport layer protocol.
>
Thanks for the replies that's my opinion as well.  We'll leave it as
documented.

~Tim

>
> Best regards,
> Ole