<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-liu-ipsecme-ikev2-mtu-dect-04" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.2 -->
  <front>
    <title abbrev="IPv4 Link Atomic Packet Notification">IKEv2 IPv4 Link Maximum Atomic Packet Notification Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-liu-ipsecme-ikev2-mtu-dect-04"/>
    <author initials="D." surname="Migault" fullname="Daniel Migault" role="editor">
      <organization>Ericsson</organization>
      <address>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="D." surname="Liu" fullname="Daiying Liu" role="editor">
      <organization>Ericsson</organization>
      <address>
        <email>harold.liu@ericsson.com</email>
      </address>
    </author>
    <author initials="R." surname="Liu" fullname="Renwang Liu">
      <organization>Ericsson</organization>
      <address>
        <email>renwang.liu@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Zhang" fullname="Congjie Zhang">
      <organization>Ericsson</organization>
      <address>
        <email>congjie.zhang@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="November" day="21"/>
    <area>Security</area>
    <workgroup>IPsecme</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document considers a ingress and an egress security gateway connected over a IPv4 network. 
The Tunnel Link Packet have their Don't Fragment (DF) set to 0.</t>
      <t>This document defines the IKEv2 IPv4 Link Maximum Atomic Packet Notification Extension which enables the egress security gateway to notify the ingress security gateway that Mid-tunnel Fragmentation is observed with the value of the Link Maximum Atomic Packet. 
The ingress security gateway is expected to take action as to avoid the egress security gateway to perform costly reassemble operation. 
The ingress security gateway is expected to either perform (when possible) Inner Fragmentation of to update Tunnel MTU.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sec1">
      <name>Introduction</name>
      <t>As depicted in <xref target="fig-frag"/>, this document considers a tunnel established between a ingress and a egress security gateway. 
The Tunnel Transit Packet are IPv6 or IPv6 packets encapsulated over an IPsec/ESP <xref target="RFC4303"/> tunnel and the resulting Tunnel Link Packet is an IPv4 packet over the network N.</t>
      <t>Fragments reassembling at the egress security gateway requires additional resources which under heavy load results in service degradations. 
Firstly, the security gateway to handle states for indefinite time. 
Then, as detailed in <xref target="RFC4963"/>, <xref target="RFC6864"/> or <xref target="RFC8900"/>, the 16-bit IPv4 identification field is not large enough to prevent duplication making fragmentation not sufficiently robust at high data rates.</t>
      <t>The egress security gateway needs to reassemble fragmented packets when Mid tunnel fragmentation occurs (only for IPv4 DF=0  Tunnel Link Packet) (see (2) in <xref target="fig-frag"/> or when the  Outer fragmentation is performed by the ingress node (see 3 in <xref target="fig-frag"/>).</t>
      <t>One can reasonably question why setting the IPv4 DF=1 is not sufficient to avoid fragmentation. 
The reason is that this setting DF=1 leads to a black holing situation, and setting DF=0 is the way to mitigate this. 
Suppose the Don't Fragment bit to 1 in the IPv4 Header of the Tunnel Link Packet. 
If that packet becomes larger than the link Maximum Transmission Unit (MTU), the packet is dropped by an on-path router and an ICMPv4 message Packet Too Big (PTB) <xref target="RFC0792"/> is returned to the sending address.
The ICMPv4 PTB message is a Destination Unreachable message with Code equal to 4 and was augmented by <xref target="RFC1191"/> to indicate the acceptable MTU.
Unfortunately, one cannot rely on such procedure as in practice some routers do not check the MTU and as such do not send ICMPv4 messages.
In addition, when ICMv4 message are sent these message are unprotected, and may be blocked by firewalls or ignored.
This results in IPv4 packets being dropped without the security gateways being aware of it which is also designated as black holing.
To prevent this situation, IPv4 packets often set their DF bit set to 0.
In this case, as described in <xref target="RFC0792"/>, when a packet size exceeds its MTU, the node fragments the incoming packet in multiple fragments.</t>
      <t>This document describes a mechanism where the egress security gateway can inform the in ingress security gateway that fragmentation is being observed. 
The ingress security gateway SHOULD either perform:</t>
      <ol spacing="normal" type="1"><li>inner fragmentation when the Tunnel transit packet is IPv4 with DF=0 (see Inner fragmentation (3) in <xref target="fig-frag"/>). 
When the Tunnel transit Packet is IPv4 with DF=0, the ingress nodes fragments it into chunks that do not exceeds the MAP, so the (IPv4) encapsulated Tunnel Link Packet does not undergo Mid-tunnel fragmentation (See section 4.2.2 of <xref target="I-D.ietf-intarea-tunnels"/>).</li>
        <li>reduce the Tunnel MTU as to avoid the fragmentation (see No Fragmentation (1),  Source fragmentation (5) in <xref target="fig-frag"/>). 
The ingress node propagates the tunnel MTU back to the source so the Source does not emit packets larger than the MAP. This is done by configuring the EMTU_R associated to the SA. Upon receiving a Tunnel Transit Packet larger than the MAP, the packet is discarded and an ICMP PTB message is returned to the Source which then performs Source Fragmentation (5) (See 8.2.1. of <xref target="RFC4301"/>).</li>
      </ol>
      <t>Source Fragmentation by the ingress node for the link layer (as recommended in <xref target="I-D.ietf-intarea-tunnels"/>) is not considered as is does not prevent the reassembly operation.</t>
      <t>Note that the two mechanisms implement fragmentation with radical different views. More specifically <xref target="I-D.ietf-intarea-tunnels"/> considers Tunnel MTU and link layer MTU as relatively independent while <xref target="RFC4301"/> correlates them strongly.
A significant difference between MPA and MTU is that fragmentation in <xref target="I-D.ietf-intarea-tunnels"/> is not supposed to impact the MTU and ICMP PTB is only expected when the router is not able to handle the packet.
MPA on the other hand is an indication fragmentation is happening.</t>
      <t>This mechanism follows the <xref target="RFC8900"/> that recommends each layer handles fragmentation at their layer and to reduce the reliance on IP fragmentation to the greatest degree possible.
This document does not describes a Path MTU Discovery (PMTUD)  procedure <xref target="RFC1191"/> nor an Execute Packetization Layer PMTUD (PLMTUD) <xref target="RFC4821"/> procedure.</t>
      <figure anchor="fig-frag">
        <name>Illustration of Different Type of Fragmentation</name>
        <artwork><![CDATA[
Source          Security             Security             Destination
or              Gateway              Gateway              or
Sender       (Ingress node)        (Egress node)          Receiver

+--+             +---+                 +---+              +---+
|  |  +  +  +    |   |  +  +  +  +  +  |   |  +  +  +  +  |   |
+--+  routers    +---+    routers      +---+  routers     +---+
                  <--------------------->
                            N
+---+---+----+                            +---+---+----+
|IPs|IPd|Data|  Tunnel transit packet     |IPs|IPd|Data|
+---+---+----+                            +---+---+----+



1) No fragmentation

                +---+---+---+---+---+----+
                |IPi|IPe|ESP|IPs|IPd|Data|  Tunnel Link Packet (TLP)
                +---+---+---+---+---+----+

2) Mid-tunnel (performed by a router on N)
  (only for IPv4 DF=0  Tunnel Link Packet)
                    +---+---+---+---+---+--+
                    |IPi|IPe|ESP|IPs|IPd|Da|  Tunnel Link Packet (TLP)
                    +---+---+---+---+---+--+
                +---+---+--+
                |IPi|IPe|ta|  Tunnel Link Packet
                +---+---+--+
 
3) Inner fragmentation (performed by the Ingress node)
  (only for IPv4 DF=0 Tunnel transit packet)

                +---+---+---+---+---+--+
                |IPi|IPe|ESP|IPs|IPd|Da|  Tunnel Link Packet (TLP)
                +---+---+---+---+---+--+
            +---+---+---+---+---+--+
            |IPi|IPe|ESP|IPs|IPd|ta|  Tunnel Link Packet (TLP)
            +---+---+---+---+---+--+

4) Outer fragmentation (performed by the Ingress node)
                +---+---+---+---+---+--+
                |IPi|IPe|ESP|IPs|IPd|Da|  Tunnel Link Packet (TLP)
                +---+---+---+---+---+--+
            +---+---+--+
            |IPi|IPe|ta|  Tunnel Link Packet (TLP)
            +---+---+--+

5) Source fragmentation
  (IPv6 or IPv4)
    +---+---+--+
    |IPs|IPd|Da|  Tunnel transit packet
    +---+---+--+
+---+---+--+
|IPs|IPd|ta|
+---+---+--+

]]></artwork>
      </figure>
    </section>
    <section anchor="sec2">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="ipv4-link-maximum-atomic-packet-support-negotiation">
      <name>IPv4 Link Maximum Atomic Packet Support Negotiation</name>
      <t>During an IKEv2 negotiation, the initiator and the responder indicate their support for notifying an IPv4 Link Maximum Atomic Packet by exchanging the IP4_LINK_MAP_SUPPORTED notifications. 
This notification MUST be sent in the IKE_AUTH exchange (in case of multiple IKE_AUTH exchanges - in the first IKE_AUTH message from initiator and in the last IKE_AUTH message from responder). 
If both the initiator and the responder send this notification during the IKE_AUTH exchange, peers may notify each other with an IPv4 Link Maximum Atomic Packet Notification when fragmentation is observed. 
Upon receiving such notifications, the peers may take the necessary actions to prevent such fragmentation to occur.</t>
      <artwork><![CDATA[
Initiator                         Responder
-------------------------------------------------------------------
HDR, SA, KEi, Ni -->
                         <-- HDR, SA, KEr, Nr
HDR, SK {IDi, AUTH,
     SA, TSi, TSr,
     N(IP4_LINK_MAP_SUPPORTED)} -->
                         <-- HDR, SK {IDr, AUTH,
                             SA, TSi, TSr,
                             N(IP4_LINK_MAP_SUPPORTED)}
]]></artwork>
    </section>
    <section anchor="sending-an-ipv4-link-maximum-atomic-packet-notification">
      <name>Sending an IPv4 Link Maximum Atomic Packet Notification</name>
      <t>The egress security gateway detects fragmentation occurred when it received a fragment the Flags 'More Fragment Bit' in IP header set to 1. 
In that case it takes the length of that fragment (Total Length) for the Link Maximum Atomic Packet length. 
<xref target="fig_ip4_header"/> shows the IPv4 Header as described in <xref target="RFC0791"/> section 3.1 to illustrate the different fields involved.</t>
      <figure anchor="fig_ip4_header">
        <name>IPv4 Header</name>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version|  IHL  |Type of Service|          Total Length         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Identification        |Flags|      Fragment Offset    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Time to Live |    Protocol   |         Header Checksum       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       Source Address                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Destination Address                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Options                    |    Padding    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>It is not expected that the egress security gateway sends a IPv4 Link Maximum Atomic Packet Notification each time a fragmentation is observed. 
Such heuristics are expected to be configurable and trigger a IPv4 Link Maximum Atomic Packet Notification.</t>
      <t>Such heuristics include, for example, a threshold for number of initial fragment received, a threshold for a certain rate of initial fragments. 
Such thresholds are also expected to be combined with a timer or a counter of already sent IP4_LINK_MAP notifications to avoid overloading the sending gateways with such notifications.
It is expected that the time between two such notifications increases with the number of notifications.</t>
      <t>The receiving security gateway determines a recommended MTU value to be used by the sending gateway.
The recommended MTU SHOULD be one of the potential ongoing MTU observed from IPv4 ESP packets that have been correctly authenticated.
The recommended MTU SHOULD be greater than some minimal values. 
<xref target="RFC0791"/> specifies the IPv4 minimum MTU is 68 octets, but greater values are likely to be more realistic.
Once the appropriated MTU has been selected, the receiving security gateway sends the sending gateway a IP4_LINK_MAP notification to the sending gateway as described below:</t>
      <artwork><![CDATA[
Egress Security Gateway                 Ingress Security Gateway
-------------------------------------------------------------------
HDR SK { N(IP4_LINK_MAP)} -->
]]></artwork>
    </section>
    <section anchor="receiving-an-ipv4-link-maximum-atomic-packet-notification">
      <name>Receiving an IPv4 Link Maximum Atomic Packet Notification</name>
      <t>Upon receiving a IP4_LINK_MAP notification, the ingress security gateway derives the tunnel MAP from the received Link MAP as follows:</t>
      <t>tunnel MAP = link MAP - outer IP header - encapsulation overhead</t>
      <t>where encapsulation overhead contains the ESP header, the ESP Trailer including the variable Pad field.
When the padding is minimizing the Pad Len, the encapsulation header is set to 14 (+ the size of the ICV).</t>
      <t>The ingress security gateway may perform Source Fragmentation of the Tunnel Link Packet also represented as Inner Fragmentation (3). More specifically, when the Tunnel transit Packet is IPv4 with DF=0, the ingress nodes fragments it into chunks that do not exceeds the MAP, so the (IPv4) encapsulated Tunnel Link Packet does not undergo Mid-tunnel fragmentation (See section 4.2.2 of <xref target="I-D.ietf-intarea-tunnels"/>).</t>
      <t>The details of the ingress processing is described below with TP being the Tunnel Transit Packet.</t>
      <t><tt>
if (TP.len &lt;= tunnel MAP) then
         encapsulate the TP and emit
      else
         if (tunnel MAP &lt; TP.len) then
            encapsulate the TP, creating the TLP
            fragment the TLP into tunnel MAP chunks
            emit the TLP fragments
         endif
      endif
</tt></t>
      <t>The ingress security gateway SHOULD propagates the tunnel MTU back to the source so the Source does not emit packets larger than the MAP. 
This is done by configuring the EMTU_R associated to the SA. Upon receiving a Tunnel Transit Packet larger than the MAP, the packet is discarded and an ICMP PTB message is returned to the Source which then performs Source Fragmentation (5) (See 8.2.1. of <xref target="RFC4301"/>).</t>
      <t>It is worth mentioning that only futures packets will be impacted, that is not those causing fragmentation.</t>
    </section>
    <section anchor="payload-description">
      <name>Payload Description</name>
      <t><xref target="fig_notify"/> illustrates the Notify Payload packet format as described in Section 3.10 of <xref target="RFC7296"/> with a 4 bytes path allowed MTU value as notification data.
This format is used for both the IP4_LINK_MAP_SUPPORTED and IP4_LINK_MAP notifications.</t>
      <figure anchor="fig_notify">
        <name>Notify Message Format</name>
        <artwork><![CDATA[
1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Protocol ID  |   SPI Size    |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                       Notification Data                       ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>The fields Next Payload, Critical Bit, RESERVED and Payload Length are defined in <xref target="RFC7296"/>. Specific fields defined in this document are:</t>
      <dl>
        <dt>Protocol ID (1 octet):</dt>
        <dd>
          <t>set to zero.
SPI Size (1 octet):</t>
        </dd>
        <dt/>
        <dd>
          <t>set to zero.
Notify Message Type (2 octets):</t>
        </dd>
        <dt/>
        <dd>
          <t>Specifies the type of notification message. It is set to TBD1 by IANA for the IP4_LINK_MAP_SUPPORTED notification or to TBD2 by IANA for the IP4_LINK_MAP notification.
Notification Data:</t>
        </dd>
        <dt/>
        <dd>
          <t>Specifies the data associated to the notification message. It is empty for the IP4_LINK_MAP_SUPPORTED notification or a 4 octets that contains the MTU value for the IP4_LINK_MAP notification - as represented in <xref target="fig_mtu_data"/>.</t>
        </dd>
      </dl>
      <figure anchor="fig_mtu_data">
        <name>Notification Data for IP4_LINK_MAP</name>
        <artwork><![CDATA[
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|           Link Path Maximum Atomic Packet Value               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to allocate two values in the "IKEv2 Notify Message Types - Status Types" registry
(available at https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-16) with the following definition:</t>
      <artwork><![CDATA[
+=======+================================+
| Value | NOTIFY MESSAGES - STATUS TYPES |
+=======+================================+
| TBD1  | IP4_LINK_MAP_SUPPORTED         |
| TBD2  | IP4_LINK_MAP                   |
+-------+--------------------------------+
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document defines an IKEv2 extension that informs a sending gateway that fragmentation is observed.
In addition, an observed MTU value is reported to the sending security gateway. 
These pieces of information are inferred from a valid ESP packet that is authenticated, and the information is transferred from one security gateway to the other security gateway using the protected IKEv2 channel.</t>
      <t>On the other hand, ESP does not provides any protection to the IPv4 header and as such to fragmentation procedure nor related pieces of information defined in <xref target="RFC0791"/>, <xref target="RFC8900"/>. 
In our case, this includes information such as the DF bit and MF bit of the Flags field as well as the Total Length field from which the link MAP is inferred.
This is not surprising as fragmentation in the case of IPv4 MAY be performed by any node.<br/>
Similarly, ICMPv4 PTB messages are not protected either. 
As a result, the security considerations related to MTU discovery <xref target="RFC0791"/>, <xref target="RFC8900"/>, <xref target="RFC4963"/>, <xref target="RFC6864"/>, <xref target="RFC1191"/> apply here.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank Paul Wouters, Joe Touch for his reviews and valuable comments and suggestions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4303.xml">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC6864" target="https://www.rfc-editor.org/info/rfc6864" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6864.xml">
          <front>
            <title>Updated Specification of the IPv4 ID Field</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>The IPv4 Identification (ID) field enables fragmentation and reassembly and, as currently specified, is required to be unique within the maximum lifetime for all datagrams with a given source address/destination address/protocol tuple.  If enforced, this uniqueness requirement would limit all connections to 6.4 Mbps for typical datagram sizes.  Because individual connections commonly exceed this speed, it is clear that existing systems violate the current specification.  This document updates the specification of the IPv4 ID field in RFCs 791, 1122, and 2003 to more closely reflect current practice and to more closely match IPv6 so that the field's value is defined only when a datagram is actually fragmented.  It also discusses the impact of these changes on how datagrams are used. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6864"/>
          <seriesInfo name="DOI" value="10.17487/RFC6864"/>
        </reference>
        <reference anchor="RFC8900" target="https://www.rfc-editor.org/info/rfc8900" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8900.xml">
          <front>
            <title>IP Fragmentation Considered Fragile</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="O. Troan" initials="O." surname="Troan"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document describes IP fragmentation and explains how it introduces fragility to Internet communication.</t>
              <t>This document also proposes alternatives to IP fragmentation and provides recommendations for developers and network operators.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="230"/>
          <seriesInfo name="RFC" value="8900"/>
          <seriesInfo name="DOI" value="10.17487/RFC8900"/>
        </reference>
        <reference anchor="RFC0792" target="https://www.rfc-editor.org/info/rfc792" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.0792.xml">
          <front>
            <title>Internet Control Message Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="RFC1191" target="https://www.rfc-editor.org/info/rfc1191" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1191.xml">
          <front>
            <title>Path MTU discovery</title>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="November" year="1990"/>
            <abstract>
              <t>This memo describes a technique for dynamically discovering the maximum transmission unit (MTU) of an arbitrary internet path.  It specifies a small change to the way routers generate one type of ICMP message.  For a path that passes through a router that has not been so changed, this technique might not discover the correct Path MTU, but it will always choose a Path MTU as accurate as, and in many cases more accurate than, the Path MTU that would be chosen by current practice. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1191"/>
          <seriesInfo name="DOI" value="10.17487/RFC1191"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4821" target="https://www.rfc-editor.org/info/rfc4821" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4821.xml">
          <front>
            <title>Packetization Layer Path MTU Discovery</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="J. Heffner" initials="J." surname="Heffner"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets.  This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4821"/>
          <seriesInfo name="DOI" value="10.17487/RFC4821"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC0791" target="https://www.rfc-editor.org/info/rfc791" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.0791.xml">
          <front>
            <title>Internet Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="791"/>
          <seriesInfo name="DOI" value="10.17487/RFC0791"/>
        </reference>
        <reference anchor="RFC7296" target="https://www.rfc-editor.org/info/rfc7296" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol.  IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs).  This document obsoletes RFC 5996, and includes all of the errata for it.  It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4963" target="https://www.rfc-editor.org/info/rfc4963" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4963.xml">
          <front>
            <title>IPv4 Reassembly Errors at High Data Rates</title>
            <author fullname="J. Heffner" initials="J." surname="Heffner"/>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="B. Chandler" initials="B." surname="Chandler"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="July" year="2007"/>
            <abstract>
              <t>IPv4 fragmentation is not sufficiently robust for use under some conditions in today's Internet.  At high data rates, the 16-bit IP identification field is not large enough to prevent frequent incorrectly assembled IP fragments, and the TCP and UDP checksums are insufficient to prevent the resulting corrupted datagrams from being delivered to higher protocol layers.  This note describes some easily reproduced experiments demonstrating the problem, and discusses some of the operational implications of these observations.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4963"/>
          <seriesInfo name="DOI" value="10.17487/RFC4963"/>
        </reference>
        <reference anchor="I-D.ietf-intarea-tunnels" target="https://www.ietf.org/archive/id/draft-ietf-intarea-tunnels-10.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.ietf-intarea-tunnels.xml">
          <front>
            <title>IP Tunnels in the Internet Architecture</title>
            <author fullname="Joe Touch" surname="Touch">
              <organization>Independent consultant</organization>
            </author>
            <author fullname="Mark Townsley" surname="Townsley">
              <organization>Cisco</organization>
            </author>
            <date day="12" month="September" year="2019"/>
            <abstract>
              <t>This document discusses the role of IP tunnels in the Internet architecture. An IP tunnel transits IP datagrams as payloads in non- link layer protocols. This document explains the relationship of IP tunnels to existing protocol layers and the challenges in supporting IP tunneling, based on the equivalence of tunnels to links. The implications of this document are used to derive recommendations that update MTU and fragment issues in RFC 4459.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-tunnels-10"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
