Validation of Packet Too Big Payload using Echo Request
Timothy Winters <twinters@iol.unh.edu> Mon, 27 January 2020 18:36 UTC
Return-Path: <twinters@iol.unh.edu>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA96B3A0A3E for <ipv6@ietfa.amsl.com>; Mon, 27 Jan 2020 10:36:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.99
X-Spam-Level:
X-Spam-Status: No, score=-1.99 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_SPF_HELO_TEMPERROR=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=iol.unh.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pdDd-_D0VNaB for <ipv6@ietfa.amsl.com>; Mon, 27 Jan 2020 10:36:13 -0800 (PST)
Received: from mail-wm1-x330.google.com (mail-wm1-x330.google.com [IPv6:2a00:1450:4864:20::330]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 894893A08EC for <6man@ietf.org>; Mon, 27 Jan 2020 10:35:09 -0800 (PST)
Received: by mail-wm1-x330.google.com with SMTP id p9so7858585wmc.2 for <6man@ietf.org>; Mon, 27 Jan 2020 10:35:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iol.unh.edu; s=unh-iol; h=mime-version:from:date:message-id:subject:to; bh=ulp46o9rQLl1FWqfd9bPphz/E483YeHDvdg7+lDK6bI=; b=KAh1NxnCpEzpXiXHC8+aAGV/C1aq74zh7bcX6gtCdxmvAd5C+v4e/K0+tM+M81Lxry ZjGvW0/SiVp+sB/HQfIV4U12gh7N4Drq0FpZC70rWMxj8s1u+7r/gcovIh/jse9G0d4l Rc7kvvB/xc8zs1K7lvk4sXfDVCuHtjonmATwI=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=ulp46o9rQLl1FWqfd9bPphz/E483YeHDvdg7+lDK6bI=; b=om+t0OfCod7N6EZRxNnuB+aUcsqFZRJRkRn+mEeM1IOyoyS7VtItiipyIjNXmOvhNy MeI60BYnCViybOvycsOFMO/hyJPQBM6WuQReDLLdOejJCYCc4klPtkPaFSGNIIDX92uk Ru3picbTqQRhZPHvcAJSBXbP/lCbtqJOmqf8K2g/49wAQaOftWDXCaoI9CvEbBp+jVwM 1sGGhyydD2nYIXXAa/8qEO/oD2JjQD5Q60vqDtiIVSVhF9oAfPHmtgzceUALquBiESbI jsqZb57b4lIMivpEHoNiyHtD9K1/jiA8JG63i0fIecnEuYTiVVb/vpGSM+tD7Y1oDRrs DtzQ==
X-Gm-Message-State: APjAAAUVo/fSRtK3wkQ+zEiVd9qgT++/oOFZ7flG377vgEz+ZOwkH3u0 Wy2RPFuUqzNDdEw4jMQFkxYXZ0Een1Oi2NGWw5QTnG5rE8Vacw==
X-Google-Smtp-Source: APXvYqxC3eZPxkvLXJ2EhdaycREbrFjwoymBPrDY5dBW0Km/8s+YAjwesuZifnRlz3CKMBImSM1Khzngd0luZpgKiQA=
X-Received: by 2002:a1c:df09:: with SMTP id w9mr13966456wmg.143.1580143560075; Mon, 27 Jan 2020 08:46:00 -0800 (PST)
MIME-Version: 1.0
From: Timothy Winters <twinters@iol.unh.edu>
Date: Mon, 27 Jan 2020 11:45:49 -0500
Message-ID: <CAOSSMjVzTmCRxLg8k+9t+j0u9iMMWa+T_8P7kVRKGLkiup_jDw@mail.gmail.com>
Subject: Validation of Packet Too Big Payload using Echo Request
To: 6MAN <6man@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000097bd77059d21d7f5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/EIZPlKaXBg6NITGaP5KjsWZguOw>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jan 2020 18:36:25 -0000
Hello, The IPv6 Ready Logo Committee updated testing to include a test for validating the Packet Too Big message content based on the following part of 8201. "Nodes should appropriately validate the payload of ICMPv6 PTB messages to ensure these are received in response to transmitted traffic (i.e., a reported error condition that corresponds to an IPv6 packet actually sent by the application) per [ICMPv6]." I've included the steps below used to verify the IPv6 implementation validates the Packet Too Big. *Step* *Action* *Expected Behavior* 1. TR1 forwards an Echo Request from TN2 to the NUT. The packet size is 1500 octets. The NUT should respond without fragmenting the packet to the Echo Request using TR1 as a first hop. 2. TR1 transmits a Packet Too Big message to the NUT with an ICMPv6 Identifier does not match the Echo Reply in Step 1. 3. TR1 forwards an Echo Request from TN2 to the NUT. The packet size is 1500 octets. The NUT should respond without fragmenting the packet to the Echo Request using TR1 as a first hop. We received a comment that this validation shouldn't apply to ICMPv6 and it should only apply to TCP or protocols that have state. Do we think this only applies to TCP or is it valid for all traffic? ~Tim
- Validation of Packet Too Big Payload using Echo R… Timothy Winters