Subject: Re: DF strikes again
To: Rob Quinn <rquinn@sprint.net>
From: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
List: current-users
Date: 03/15/2001 14:28:58
> > So, the trick is to find the RFC #, and contact the owner of the
> > firewall and scream that they are "not RFC-mumble compliant!!!" :-)
> 
>  Good luck. I often refer admins to
> http://www.worldgate.com/~marcs/mtu/.

ok, quoting chapter and verse:

RFC2979, "Behavior of and requirements for Internet Firewalls"

   The introduction of a firewall and any associated tunneling or
   access negotiation facilities MUST NOT cause unintended failures
   of legitimate and standards-compliant usage that would work were
   the firewall not present.

...

   By the transparency rule, a packet-filtering router acting as a
   firewall which permits outgoing IP packets with the Don't Fragment
   (DF) bit set MUST NOT block incoming ICMP Destination Unreachable /
   Fragmentation Needed errors sent in response to the outbound packets
   from reaching hosts inside the firewall, as this would break the
   standards-compliant usage of Path MTU discovery by hosts generating
   legitimate traffic.

   On the other hand, it's proper (albeit unfriendly) to block ICMP Echo
   and Echo Reply messages, since these form a different use of the
   network, or to block ICMP Redirect messages entirely, or to block
   ICMP DU/FN messages which were not sent in response to legitimate
   outbound traffic.

Note that there's a lot of room for flexibility here.. folks with ICMP
phobias can always turn off path mtu discovery on the nodes
"protected" by the firewall..

						- Bill