Internet-Draft IPv4 Link Atomic Packet Notification November 2022
Migault, et al. Expires 25 May 2023 [Page]
Workgroup:
IPsecme
Internet-Draft:
draft-liu-ipsecme-ikev2-mtu-dect-04
Published:
Intended Status:
Standards Track
Expires:
Authors:
D. Migault, Ed.
Ericsson
D. Liu, Ed.
Ericsson
R. Liu
Ericsson
C. Zhang
Ericsson

IKEv2 IPv4 Link Maximum Atomic Packet Notification Extension

Abstract

This document considers a ingress and an egress security gateway connected over a IPv4 network. The Tunnel Link Packet have their Don't Fragment (DF) set to 0.

This document defines the IKEv2 IPv4 Link Maximum Atomic Packet Notification Extension which enables the egress security gateway to notify the ingress security gateway that Mid-tunnel Fragmentation is observed with the value of the Link Maximum Atomic Packet. The ingress security gateway is expected to take action as to avoid the egress security gateway to perform costly reassemble operation. The ingress security gateway is expected to either perform (when possible) Inner Fragmentation of to update Tunnel MTU.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 25 May 2023.

Table of Contents

1. Introduction

As depicted in Figure 1, this document considers a tunnel established between a ingress and a egress security gateway. The Tunnel Transit Packet are IPv6 or IPv6 packets encapsulated over an IPsec/ESP [RFC4303] tunnel and the resulting Tunnel Link Packet is an IPv4 packet over the network N.

Fragments reassembling at the egress security gateway requires additional resources which under heavy load results in service degradations. Firstly, the security gateway to handle states for indefinite time. Then, as detailed in [RFC4963], [RFC6864] or [RFC8900], the 16-bit IPv4 identification field is not large enough to prevent duplication making fragmentation not sufficiently robust at high data rates.

The egress security gateway needs to reassemble fragmented packets when Mid tunnel fragmentation occurs (only for IPv4 DF=0 Tunnel Link Packet) (see (2) in Figure 1 or when the Outer fragmentation is performed by the ingress node (see 3 in Figure 1).

One can reasonably question why setting the IPv4 DF=1 is not sufficient to avoid fragmentation. The reason is that this setting DF=1 leads to a black holing situation, and setting DF=0 is the way to mitigate this. Suppose the Don't Fragment bit to 1 in the IPv4 Header of the Tunnel Link Packet. If that packet becomes larger than the link Maximum Transmission Unit (MTU), the packet is dropped by an on-path router and an ICMPv4 message Packet Too Big (PTB) [RFC0792] is returned to the sending address. The ICMPv4 PTB message is a Destination Unreachable message with Code equal to 4 and was augmented by [RFC1191] to indicate the acceptable MTU. Unfortunately, one cannot rely on such procedure as in practice some routers do not check the MTU and as such do not send ICMPv4 messages. In addition, when ICMv4 message are sent these message are unprotected, and may be blocked by firewalls or ignored. This results in IPv4 packets being dropped without the security gateways being aware of it which is also designated as black holing. To prevent this situation, IPv4 packets often set their DF bit set to 0. In this case, as described in [RFC0792], when a packet size exceeds its MTU, the node fragments the incoming packet in multiple fragments.

This document describes a mechanism where the egress security gateway can inform the in ingress security gateway that fragmentation is being observed. The ingress security gateway SHOULD either perform:

  1. inner fragmentation when the Tunnel transit packet is IPv4 with DF=0 (see Inner fragmentation (3) in Figure 1). When the Tunnel transit Packet is IPv4 with DF=0, the ingress nodes fragments it into chunks that do not exceeds the MAP, so the (IPv4) encapsulated Tunnel Link Packet does not undergo Mid-tunnel fragmentation (See section 4.2.2 of [I-D.ietf-intarea-tunnels]).
  2. reduce the Tunnel MTU as to avoid the fragmentation (see No Fragmentation (1), Source fragmentation (5) in Figure 1). The ingress node propagates the tunnel MTU back to the source so the Source does not emit packets larger than the MAP. This is done by configuring the EMTU_R associated to the SA. Upon receiving a Tunnel Transit Packet larger than the MAP, the packet is discarded and an ICMP PTB message is returned to the Source which then performs Source Fragmentation (5) (See 8.2.1. of [RFC4301]).

Source Fragmentation by the ingress node for the link layer (as recommended in [I-D.ietf-intarea-tunnels]) is not considered as is does not prevent the reassembly operation.

Note that the two mechanisms implement fragmentation with radical different views. More specifically [I-D.ietf-intarea-tunnels] considers Tunnel MTU and link layer MTU as relatively independent while [RFC4301] correlates them strongly. A significant difference between MPA and MTU is that fragmentation in [I-D.ietf-intarea-tunnels] is not supposed to impact the MTU and ICMP PTB is only expected when the router is not able to handle the packet. MPA on the other hand is an indication fragmentation is happening.

This mechanism follows the [RFC8900] that recommends each layer handles fragmentation at their layer and to reduce the reliance on IP fragmentation to the greatest degree possible. This document does not describes a Path MTU Discovery (PMTUD) procedure [RFC1191] nor an Execute Packetization Layer PMTUD (PLMTUD) [RFC4821] procedure.

Source          Security             Security             Destination
or              Gateway              Gateway              or
Sender       (Ingress node)        (Egress node)          Receiver

+--+             +---+                 +---+              +---+
|  |  +  +  +    |   |  +  +  +  +  +  |   |  +  +  +  +  |   |
+--+  routers    +---+    routers      +---+  routers     +---+
                  <--------------------->
                            N
+---+---+----+                            +---+---+----+
|IPs|IPd|Data|  Tunnel transit packet     |IPs|IPd|Data|
+---+---+----+                            +---+---+----+



1) No fragmentation

                +---+---+---+---+---+----+
                |IPi|IPe|ESP|IPs|IPd|Data|  Tunnel Link Packet (TLP)
                +---+---+---+---+---+----+

2) Mid-tunnel (performed by a router on N)
  (only for IPv4 DF=0  Tunnel Link Packet)
                    +---+---+---+---+---+--+
                    |IPi|IPe|ESP|IPs|IPd|Da|  Tunnel Link Packet (TLP)
                    +---+---+---+---+---+--+
                +---+---+--+
                |IPi|IPe|ta|  Tunnel Link Packet
                +---+---+--+

3) Inner fragmentation (performed by the Ingress node)
  (only for IPv4 DF=0 Tunnel transit packet)

                +---+---+---+---+---+--+
                |IPi|IPe|ESP|IPs|IPd|Da|  Tunnel Link Packet (TLP)
                +---+---+---+---+---+--+
            +---+---+---+---+---+--+
            |IPi|IPe|ESP|IPs|IPd|ta|  Tunnel Link Packet (TLP)
            +---+---+---+---+---+--+

4) Outer fragmentation (performed by the Ingress node)
                +---+---+---+---+---+--+
                |IPi|IPe|ESP|IPs|IPd|Da|  Tunnel Link Packet (TLP)
                +---+---+---+---+---+--+
            +---+---+--+
            |IPi|IPe|ta|  Tunnel Link Packet (TLP)
            +---+---+--+

5) Source fragmentation
  (IPv6 or IPv4)
    +---+---+--+
    |IPs|IPd|Da|  Tunnel transit packet
    +---+---+--+
+---+---+--+
|IPs|IPd|ta|
+---+---+--+

Figure 1: Illustration of Different Type of Fragmentation

2. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

6. Payload Description

Figure 3 illustrates the Notify Payload packet format as described in Section 3.10 of [RFC7296] with a 4 bytes path allowed MTU value as notification data. This format is used for both the IP4_LINK_MAP_SUPPORTED and IP4_LINK_MAP notifications.

1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Protocol ID  |   SPI Size    |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                       Notification Data                       ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3: Notify Message Format

The fields Next Payload, Critical Bit, RESERVED and Payload Length are defined in [RFC7296]. Specific fields defined in this document are:

Protocol ID (1 octet):

set to zero. SPI Size (1 octet):

set to zero. Notify Message Type (2 octets):

Specifies the type of notification message. It is set to TBD1 by IANA for the IP4_LINK_MAP_SUPPORTED notification or to TBD2 by IANA for the IP4_LINK_MAP notification. Notification Data:

Specifies the data associated to the notification message. It is empty for the IP4_LINK_MAP_SUPPORTED notification or a 4 octets that contains the MTU value for the IP4_LINK_MAP notification - as represented in Figure 4.

 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|           Link Path Maximum Atomic Packet Value               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 4: Notification Data for IP4_LINK_MAP

7. IANA Considerations

IANA is requested to allocate two values in the "IKEv2 Notify Message Types - Status Types" registry (available at https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-16) with the following definition:

+=======+================================+
| Value | NOTIFY MESSAGES - STATUS TYPES |
+=======+================================+
| TBD1  | IP4_LINK_MAP_SUPPORTED         |
| TBD2  | IP4_LINK_MAP                   |
+-------+--------------------------------+

8. Security Considerations

This document defines an IKEv2 extension that informs a sending gateway that fragmentation is observed. In addition, an observed MTU value is reported to the sending security gateway. These pieces of information are inferred from a valid ESP packet that is authenticated, and the information is transferred from one security gateway to the other security gateway using the protected IKEv2 channel.

On the other hand, ESP does not provides any protection to the IPv4 header and as such to fragmentation procedure nor related pieces of information defined in [RFC0791], [RFC8900]. In our case, this includes information such as the DF bit and MF bit of the Flags field as well as the Total Length field from which the link MAP is inferred. This is not surprising as fragmentation in the case of IPv4 MAY be performed by any node.
Similarly, ICMPv4 PTB messages are not protected either. As a result, the security considerations related to MTU discovery [RFC0791], [RFC8900], [RFC4963], [RFC6864], [RFC1191] apply here.

9. Acknowledgements

The authors would like to thank Paul Wouters, Joe Touch for his reviews and valuable comments and suggestions.

10. References

10.1. Normative References

[RFC0791]
Postel, J. and RFC Publisher, "Internet Protocol", STD 5, RFC 791, DOI 10.17487/RFC0791, , <https://www.rfc-editor.org/info/rfc791>.
[RFC0792]
Postel, J. and RFC Publisher, "Internet Control Message Protocol", STD 5, RFC 792, DOI 10.17487/RFC0792, , <https://www.rfc-editor.org/info/rfc792>.
[RFC1191]
Mogul, J., Deering, S., and RFC Publisher, "Path MTU discovery", RFC 1191, DOI 10.17487/RFC1191, , <https://www.rfc-editor.org/info/rfc1191>.
[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC4301]
Kent, S., Seo, K., and RFC Publisher, "Security Architecture for the Internet Protocol", RFC 4301, DOI 10.17487/RFC4301, , <https://www.rfc-editor.org/info/rfc4301>.
[RFC4303]
Kent, S. and RFC Publisher, "IP Encapsulating Security Payload (ESP)", RFC 4303, DOI 10.17487/RFC4303, , <https://www.rfc-editor.org/info/rfc4303>.
[RFC4821]
Mathis, M., Heffner, J., and RFC Publisher, "Packetization Layer Path MTU Discovery", RFC 4821, DOI 10.17487/RFC4821, , <https://www.rfc-editor.org/info/rfc4821>.
[RFC6864]
Touch, J., "Updated Specification of the IPv4 ID Field", RFC 6864, DOI 10.17487/RFC6864, , <https://www.rfc-editor.org/info/rfc6864>.
[RFC7296]
Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T. Kivinen, "Internet Key Exchange Protocol Version 2 (IKEv2)", STD 79, RFC 7296, DOI 10.17487/RFC7296, , <https://www.rfc-editor.org/info/rfc7296>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/info/rfc8174>.
[RFC8900]
Bonica, R., Baker, F., Huston, G., Hinden, R., Troan, O., Gont, F., and RFC Publisher, "IP Fragmentation Considered Fragile", BCP 230, RFC 8900, DOI 10.17487/RFC8900, , <https://www.rfc-editor.org/info/rfc8900>.

10.2. Informative References

[I-D.ietf-intarea-tunnels]
Touch, J. and M. Townsley, "IP Tunnels in the Internet Architecture", Work in Progress, Internet-Draft, draft-ietf-intarea-tunnels-10, , <https://www.ietf.org/archive/id/draft-ietf-intarea-tunnels-10.txt>.
[RFC4963]
Heffner, J., Mathis, M., Chandler, B., and RFC Publisher, "IPv4 Reassembly Errors at High Data Rates", RFC 4963, DOI 10.17487/RFC4963, , <https://www.rfc-editor.org/info/rfc4963>.

Authors' Addresses

Daniel Migault (editor)
Ericsson
Daiying Liu (editor)
Ericsson
Renwang Liu
Ericsson
Congjie Zhang
Ericsson