Validation of Packet Too Big Payload using Echo Request

Timothy Winters <twinters@iol.unh.edu> Mon, 27 January 2020 18:36 UTC

Return-Path: <twinters@iol.unh.edu>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA96B3A0A3E for <ipv6@ietfa.amsl.com>; Mon, 27 Jan 2020 10:36:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.99
X-Spam-Level:
X-Spam-Status: No, score=-1.99 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_SPF_HELO_TEMPERROR=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=iol.unh.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pdDd-_D0VNaB for <ipv6@ietfa.amsl.com>; Mon, 27 Jan 2020 10:36:13 -0800 (PST)
Received: from mail-wm1-x330.google.com (mail-wm1-x330.google.com [IPv6:2a00:1450:4864:20::330]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 894893A08EC for <6man@ietf.org>; Mon, 27 Jan 2020 10:35:09 -0800 (PST)
Received: by mail-wm1-x330.google.com with SMTP id p9so7858585wmc.2 for <6man@ietf.org>; Mon, 27 Jan 2020 10:35:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iol.unh.edu; s=unh-iol; h=mime-version:from:date:message-id:subject:to; bh=ulp46o9rQLl1FWqfd9bPphz/E483YeHDvdg7+lDK6bI=; b=KAh1NxnCpEzpXiXHC8+aAGV/C1aq74zh7bcX6gtCdxmvAd5C+v4e/K0+tM+M81Lxry ZjGvW0/SiVp+sB/HQfIV4U12gh7N4Drq0FpZC70rWMxj8s1u+7r/gcovIh/jse9G0d4l Rc7kvvB/xc8zs1K7lvk4sXfDVCuHtjonmATwI=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=ulp46o9rQLl1FWqfd9bPphz/E483YeHDvdg7+lDK6bI=; b=om+t0OfCod7N6EZRxNnuB+aUcsqFZRJRkRn+mEeM1IOyoyS7VtItiipyIjNXmOvhNy MeI60BYnCViybOvycsOFMO/hyJPQBM6WuQReDLLdOejJCYCc4klPtkPaFSGNIIDX92uk Ru3picbTqQRhZPHvcAJSBXbP/lCbtqJOmqf8K2g/49wAQaOftWDXCaoI9CvEbBp+jVwM 1sGGhyydD2nYIXXAa/8qEO/oD2JjQD5Q60vqDtiIVSVhF9oAfPHmtgzceUALquBiESbI jsqZb57b4lIMivpEHoNiyHtD9K1/jiA8JG63i0fIecnEuYTiVVb/vpGSM+tD7Y1oDRrs DtzQ==
X-Gm-Message-State: APjAAAUVo/fSRtK3wkQ+zEiVd9qgT++/oOFZ7flG377vgEz+ZOwkH3u0 Wy2RPFuUqzNDdEw4jMQFkxYXZ0Een1Oi2NGWw5QTnG5rE8Vacw==
X-Google-Smtp-Source: APXvYqxC3eZPxkvLXJ2EhdaycREbrFjwoymBPrDY5dBW0Km/8s+YAjwesuZifnRlz3CKMBImSM1Khzngd0luZpgKiQA=
X-Received: by 2002:a1c:df09:: with SMTP id w9mr13966456wmg.143.1580143560075; Mon, 27 Jan 2020 08:46:00 -0800 (PST)
MIME-Version: 1.0
From: Timothy Winters <twinters@iol.unh.edu>
Date: Mon, 27 Jan 2020 11:45:49 -0500
Message-ID: <CAOSSMjVzTmCRxLg8k+9t+j0u9iMMWa+T_8P7kVRKGLkiup_jDw@mail.gmail.com>
Subject: Validation of Packet Too Big Payload using Echo Request
To: 6MAN <6man@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000097bd77059d21d7f5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/EIZPlKaXBg6NITGaP5KjsWZguOw>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jan 2020 18:36:25 -0000

Hello,

The IPv6 Ready Logo Committee updated testing to include a test for
validating the Packet Too Big message content based on the following part
of 8201.

"Nodes should appropriately validate the payload of ICMPv6 PTB
   messages to ensure these are received in response to transmitted
   traffic (i.e., a reported error condition that corresponds to an IPv6
   packet actually sent by the application) per [ICMPv6]."

I've included the steps below used to verify the IPv6 implementation
validates the Packet Too Big.

*Step*

*Action*

*Expected Behavior*

1.

TR1 forwards an Echo Request from TN2 to the NUT.  The packet size is 1500
octets.

The NUT should respond without fragmenting the packet to the Echo Request
using TR1 as a first hop.

2.

TR1 transmits a Packet Too Big message to the NUT with an ICMPv6 Identifier
does not match the Echo Reply in Step 1.



3.

TR1 forwards an Echo Request from TN2 to the NUT.  The packet size is 1500
octets.

The NUT should respond without fragmenting the packet to the Echo Request
using TR1 as a first hop.

We received a comment that this validation shouldn't apply to ICMPv6 and it
should only apply to TCP or protocols that have state.   Do we think this
only applies to TCP or is it valid for all traffic?

~Tim