Rick Jones wrote:
But it is still bad, and I worry (fear, uncertainty and doubt, oh my) that someone reading the draft will say "oh, good, my stack does things in a different order so it must not be so bad"

Maybe just some "while we use in-order as an example the problem is still present and bad with other packet orderings" text.

Will try to make this a little more clear.  Thanks for the input.


A while back, over in the "netdev" mailing list, the we were discussing ways to minimize the risk of frankengrams springing to life based on ass-u-me-ing :) that if one saw N or more datagrams beyond the one(s) being reassembled, the likelihood of those datagrams successfully reassembling was epsilon. While the specifics of that may be more "linux-centric" than an RFC should be, I suspect the discussion might provide a starting point for a useful, additional section in the RFC discussing ways transport stacks might minimize the likelihood of Frankengrams.


It would be a good place to start for a *future* draft on the subject. We decided it is out of scope for this one.

Maybe it is drifting a bit, but isn't it rather like announcing a vulnerabilty without announcing how to mitigate it?

I'd say it's more like when a bridge is out, first putting up a warning sign, then worrying about how to fix it. ;)

Seriously, we considered writing a section like this. But on careful thought, it was not obvious how to mitigate the problem robustly. The Linux solution works pretty well under specific conditions, but writing a BCP on how to safely use fragmentation for high bandwidth apps could get thorny. The safest thing to do is just not use fragmentation for these apps, or if you absolutely must, at least add protection (like IPsec).

Thanks,
  -John

_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to