[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Wrap-up: TCP checksum calculation



On 2007-03-14 11:53, marcelo bagnulo braun wrote:

El 13/03/2007, a las 22:30, Erik Nordmark escribió:

marcelo bagnulo braun wrote:

The problem is that shim6 payload packets that carry locators different than ULIDs, will have the checksum calculated based on the ULIDs and not on the actual addresses carried in the ipv6 header. This would imply that any device in the middle (from NIC to middle boxes (firewalls and TCP relays)) will fail the checksum verification (and drop the packet). It is possible that TCP checksum verification is more common, since there is no IP checksum in IPv6.

I don't understand what the issue is.

The shim6 packets have a protocol/nexthdr field which is shim6 and not TCP, UDP, etc.

Thus an unmodified middlebox doesn't see a TCP packet - it seems a to it unknown IP protocol.

Only if the middlebox is modified to know about shim6 would it be able to skip the shim6 header to find the TCP, UDP, etc header. And a middlebox which is modified to know about shim6 could be aware that the TCP/UDP etc checksums are different when there is a shim6 payload message before the TCP/UDP header.


Proposed approach:
First: Add a new section titled "Middle-boxes considerations" with the following text. It is recommended that firewalls and other middleboxes do not drop TCP, UDP and ICMP packets with apparently incorrect checksums based on that fact alone unless they implement (monitoring of) the full shim6 protocol and are able to determine the checksum that must be present in a packet with addresses rewritten by shim6."

If the above sentence was expanded to say that these TCP etc headers are the ones that follow a shim6 header, then it would be a useful addition.


Add a new section titled "Middle-boxes considerations" with the following text.

Data packets belonging to a Shim6 context carrying the Shim6 Payload Header contain alternative locators other than the ULIDs in the source and destination address fields of the IPv6 header. However, if those data packets are TCP or UDP packets, the presudoheader used for the checksum calculation will contain the ULID pair, rather than the locator pair contained in the data packet. It is possible that some firewalls or other middle boxes verify the TCP/UDP checksum. Those middleboxes need to be updated in order to be able to parse the Shim6 payload header and find the TCP/UDP header after that. It is recommended that firewalls and other middleboxes do not drop TCP, UDP and ICMP packets that carry the Shim6 Payload header with apparently incorrect checksums when using the addresses in the IPv6 header for the pseudoheader computation, unless they implement (monitoring of) the full shim6 protocol and are able to determine the checksum that must be present in a packet with addresses rewritten by shim6.

would this be ok/enough?

I don't know how TCP relays work. If (as seems logical) they correctly
terminate the first hop of TCP, they could be shim6-capable (in which
case they will do the right thing). If they are not shim6-capable,
then shim6 will never be used by the originating host and we have
no problem.

On the other hand, if TCP relays mess with addresses and checksums
like a NAT does, the above text should apply.

So I think we are OK.

    Brian