On Mon, 8 Jul 2002, Matthias Andree wrote:

> On Tue, 02 Jul 2002, James Yonan wrote:
> 
> > At one point I considered using adaptive code to automatically set the
> > MTU, then I read a paper that described various DoS attacks against common
> > path MTU discovery algorithms, so I held off on that.
> 
> Is not the kernel itself also susceptible in that case unless PMTU
> discovery is disabled for that route?

Right, you would need to set the Don't Fragment bit in the socket to 
disable the kernel's PMTU then implement your own secure PMTU.

> 
> OTOH, I haven't read a single paper on PMTU discovery DoS attacks, so
> I cannot comment on the details.

http://www.off.net/~jme/ietf/draft-etienne-secure-pmtud-00.txt

> 
> > It would be great if there was an easy way of getting the dynamic path MTU 
> > from the OS, but I'm not aware of any portable method to do this.
> > 
> > While reducing the default to 1472 or lower might work, it would also
> > break compatibility...  right now we can brag that the protocol hasn't
> > changed since 1.1.0, and while this isn't really a protocol change, it
> > does introduce a slight incompatibility with prior versions.  I would
> > prefer to hold off on patches that break compatibility until 1.3.0.
> 
> Sure. Documenting that the admin who sets up OpenVPN should experiment
> with the UDP-MTU and lower it until no fragmentation occurs is fine with
> me.
> 
> > > If OpenVPN adapting the UDP MTU, I'd appreciate if the adaption progress
> > > would be logged akin to LZO adaption.
> > 
> > There is a common algorithm known as Path MTU Discovery where you set the 
> > Don't Fragment bit on the socket then figure out by heuristics the largest 
> > packet size that will get through.  But it would be better to let the OS 
> > figure this out and then tell us in a portable way, if this is possible.
> 
> Yes. I recently made some experiences with obtaining interface/netmask
> configuration. Don't try this for IPv6, it'll boggle your mind. Each
> system has its own approach. Netlink, a "long" SIOCGIFNETMASK variant,
> whatever.
> 
> > > Again, please apologize if I wrote nonsense, I'm not really aware of the
> > > packet encapsulation and framing process in OpenVPN.
> > 
> > No, your ideas are good.  In fact I would vote that we move these 
> > discussions to openvpn-devel so that more people can participate.
> 
> OK, I'll look at that list then. Feel free to bounce this mail and my
> last one there so people know what we're talking about.
> 
> Thanks,
> 
> 


Reply via email to