Re: [dnssd] Genart last call review of draft-ietf-dnssd-push-20

Tom Pusateri <pusateri@bangj.com> Fri, 12 July 2019 00:56 UTC

Return-Path: <pusateri@bangj.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4AC1C1200C7; Thu, 11 Jul 2019 17:56:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2vod9HmUH1Xk; Thu, 11 Jul 2019 17:56:27 -0700 (PDT)
Received: from oj.bangj.com (69-77-154-174.static.skybest.com [69.77.154.174]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75CC3120086; Thu, 11 Jul 2019 17:56:27 -0700 (PDT)
Received: from [172.16.25.146] (69-77-155-155.static.skybest.com [69.77.155.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by oj.bangj.com (Postfix) with ESMTPSA id 261C3347FA; Thu, 11 Jul 2019 20:56:26 -0400 (EDT)
From: Tom Pusateri <pusateri@bangj.com>
Message-Id: <AC1E030E-2778-49F3-9829-B89C364DAB1F@bangj.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_29554589-F267-44E4-95C1-ACC0BD02656F"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3564\))
Date: Thu, 11 Jul 2019 20:56:25 -0400
In-Reply-To: <56174A38-0D4A-4E77-BC30-3F99534C7337@fugue.com>
Cc: Stuart Cheshire <cheshire=40apple.com@dmarc.ietf.org>, Eric Rescorla <ekr@rtfm.com>, DNSSD <dnssd@ietf.org>, draft-ietf-dnssd-push.all@ietf.org, David Schinazi <dschinazi.ietf@gmail.com>, Robert Sparks <rjsparks@nostrum.com>
To: Ted Lemon <mellon@fugue.com>
References: <156175221593.21875.9525138908968318905@ietfa.amsl.com> <9E6DE124-9262-4870-A920-4E707A38DC08@bangj.com> <CAPDSy+7om=cBW51cyuPea9nabgJuRV3M+++gA7sy8VzfNpkn6Q@mail.gmail.com> <9F8CFF4A-ABC1-4005-AE65-6CE64940B59F@apple.com> <CAPDSy+6V+ooWDe7XezmWA_XKNQXRAOex8DE5CiTnZdz8zc-9CA@mail.gmail.com> <F6DD5CEF-E644-46E3-84B5-18309F6B44C5@apple.com> <270A8516-8BE8-441A-A6CC-4FDE8EFE2B10@fugue.com> <BF75518F-25E9-4283-B647-6382F50A5CCA@bangj.com> <ED99C670-3149-417C-B465-99A48D70C584@bangj.com> <83331D7B-2853-4B5B-8350-ACD18922780E@fugue.com> <FC48248A-51E9-421A-8C91-B4DD41C9FC2F@bangj.com> <60198834-66F0-4CF0-BB09-B987684F3616@fugue.com> <680C7A57-BBF9-4AD5-9E51-AA101CDDC751@bangj.com> <56174A38-0D4A-4E77-BC30-3F99534C7337@fugue.com>
X-Mailer: Apple Mail (2.3564)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnssd/x-gK8zdTRLIJVUUucGCQZOzzmWA>
Subject: Re: [dnssd] Genart last call review of draft-ietf-dnssd-push-20
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion of extensions to DNS-based service discovery for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jul 2019 00:56:31 -0000


> On Jul 11, 2019, at 8:32 PM, Ted Lemon <mellon@fugue.com> wrote:
> 
> On Jul 11, 2019, at 7:39 PM, Tom Pusateri <pusateri@bangj.com <mailto:pusateri@bangj.com>> wrote:
>> There is no back to back reconnect in the #2 case. The server shouldn’t accept the connection after sending a RETRY DELAY to this client. The client may ignore the RETRY DELAY but this doesn’t matter. It’s only a courtesy that the SERVER tells the client how long it has to wait.
> 
> I don’t know how the server refuses connections on a per-client basis.   We certainly don’t describe how to do that in the DSO RFC.  Practically speaking, unless the server is maintaining a list of all the clients that connect to it, it has no idea that client X that it just dropped is client Y that just connected.   Even if it does maintain such a list, it would be unusual for that to allow it to actually drop the connection immediately.   And supposing it does, that might just make the client reconnect a bit faster.   That is, if the SYN gets an RST in response, the client will just get -1 from connect() and call connect() again unless it has some kind of backoff strategy.
> 

What is the point of the server sending a RETRY DELAY TLV if it isn’t going to enforce it?

The purpose of the RETRY DELAY TLV isn’t to say please be nice and wait.

It’s to say, I’ve put this filter in place that I am enforcing for this period of time. You might as well wait until you try to connect again because it won’t do any good to try before the timer expires.

So, yes, you have to keep state when you send a RETRY DELAY. When the timer fires, you remove the filter and allow the connection to proceed. You have state for the current connections and you have state for the RETRY DELAY timers you have running. SYN attacks happen and those are dealt with like any other SYN attack.

As for NAT, you’re going to block everyone coming from the same address. You should use IPv6 if you’re remote and don’t want to get blocked because of a bad actor.

If you don’t filter, you might was well not send a RETRY DELAY because the clients you’re trying to throttle are the ones that are going to ignore it.

Tom