Re: [dtn] Mirja Kühlewind's Discuss on draft-ietf-dtn-tcpclv4-18: (with DISCUSS and COMMENT)

Brian Sipos <BSipos@rkf-eng.com> Sat, 07 March 2020 22:38 UTC

Return-Path: <BSipos@rkf-eng.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66F473A1BCF; Sat, 7 Mar 2020 14:38:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rkfeng.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jw8j4eviNsCD; Sat, 7 Mar 2020 14:38:11 -0800 (PST)
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2071.outbound.protection.outlook.com [40.107.220.71]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4470C3A1BCE; Sat, 7 Mar 2020 14:37:55 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VJMWI4l80CDrjxik8YI+XBiuS5YvhpzcwwneHBPHgIOzAvQqdCSVINbuTYGzVHyDySQqt3OQhfbt8Ia/WqFu877R3+Qf1JaIu18kMS8bKRc7/s2PdAGlJKXE6FQKR1ETyZqr0vvd+UOVzfczCGAprwJ42hOaRb81GoQtFqv0J7slAeLrC1LYBcHBQBYMv63MFt0Fo8fmANqiByUtex54n5CY/kJeZvajxN74+HAfUdGbOKEajvh1iqpovYaqLLJAkHSic42e5z2vq4LDG8m5r4aolY2AEB33s2CyGKO1dzHoqVDEbjaiaxu7vSxiO6W/IHK4WfgevWKs8t6F05iyXA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;bh=EQlGH5eF1Qn3FO7auXLXI4f0+pmw9ADkNet+YEPPl5w=; b=gO28nmjnvHRo2CS3rIFNh38+rK56bfeIu1Qfj0YWcbawm/pAmhy8i7CIZ/G0frtq8wJsRvBO3OqoL5y7CeXGCQE930ZiPcjB4k2XXOiKPA0db05VtWvMoxiWnXC81RlskaPt/aAb1Q6Q40tePbJw2H5cn4XJu3zQ5eHz4i19D4RAx41/TCU38kzSdv8VSBJ/dFPw7W6Tytwh4jYZyu9Bg7heuGk5ugg4SVukKxhKCisGmYG6pDMVzerlwhq7VSZMZxbVOCWmiv14/ELfk5Lz4BsFUM7d7A46gFQz/E73YqIQ7L308L6Yto85yW/PD+wZE5wVhs5/i/YcYsDLQkzUqw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=rkf-eng.com; dmarc=pass action=none header.from=rkf-eng.com; dkim=pass header.d=rkf-eng.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rkfeng.onmicrosoft.com; s=selector2-rkfeng-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;bh=EQlGH5eF1Qn3FO7auXLXI4f0+pmw9ADkNet+YEPPl5w=; b=aoRbyVfJvNADLUSYUku+HdGdfFI7WhXy/lBI2m0pvJUx3FB81VtSgEs2hQDRfhzFjdtEpRQNV8uAEK2PAkEeDDm67xe+vK0ES9suFZrC2vK73L09EDM7So6lFDIjOXdPrUxyLW6YusXvRo+IVYnKc5w1palaXMqOLHkdMw7RN+w=
Received: from MN2PR13MB3520.namprd13.prod.outlook.com (2603:10b6:208:16c::29) by MN2PR13MB3134.namprd13.prod.outlook.com (2603:10b6:208:153::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2793.11; Sat, 7 Mar 2020 22:37:48 +0000
Received: from MN2PR13MB3520.namprd13.prod.outlook.com ([fe80::1c95:8b8:da12:470b]) by MN2PR13MB3520.namprd13.prod.outlook.com ([fe80::1c95:8b8:da12:470b%7]) with mapi id 15.20.2814.007; Sat, 7 Mar 2020 22:37:48 +0000
From: Brian Sipos <BSipos@rkf-eng.com>
To: "ietf@kuehlewind.net" <ietf@kuehlewind.net>, "iesg@ietf.org" <iesg@ietf.org>
CC: "dtn-chairs@ietf.org" <dtn-chairs@ietf.org>, "draft-ietf-dtn-tcpclv4@ietf.org" <draft-ietf-dtn-tcpclv4@ietf.org>, "dtn@ietf.org" <dtn@ietf.org>, "edward.birrane@jhuapl.edu" <edward.birrane@jhuapl.edu>
Thread-Topic: Mirja Kühlewind's Discuss on draft-ietf-dtn-tcpclv4-18: (with DISCUSS and COMMENT)
Thread-Index: AQHV5+6SE1B4R5Lbik+DBe4NsuRTvqg90i2A
Date: Sat, 07 Mar 2020 22:37:47 +0000
Message-ID: <745bfd811b9d3fb03f3e280b15fe9feb41241ba8.camel@rkf-eng.com>
References: <158220398711.12456.13531582672796496258.idtracker@ietfa.amsl.com>
In-Reply-To: <158220398711.12456.13531582672796496258.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Evolution 3.32.5 (3.32.5-1.fc30)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=BSipos@rkf-eng.com;
x-originating-ip: [108.18.140.127]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6ec6b9d1-c6f5-474e-0bd0-08d7c2e8298e
x-ms-traffictypediagnostic: MN2PR13MB3134:
x-microsoft-antispam-prvs: <MN2PR13MB31344C90492FD4D0ECC9DC249FE00@MN2PR13MB3134.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 03355EE97E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(346002)(376002)(396003)(136003)(39830400003)(199004)(189003)(186003)(508600001)(6486002)(966005)(30864003)(4326008)(5660300002)(26005)(316002)(110136005)(2906002)(66574012)(54906003)(6506007)(76116006)(81156014)(81166006)(8936002)(71200400001)(66946007)(66616009)(6512007)(66476007)(2616005)(66556008)(64756008)(36756003)(224303003)(66446008)(86362001); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR13MB3134; H:MN2PR13MB3520.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: rkf-eng.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: sa73/k5x9LXK5eoGTaoem1qSCYx6cxpVD6oEkliMkFoTC9zZbH0ZDd+rz9O6QRH4X7eAQB+fQX5XJbKqgnOq6yMlLcXIHP4JI4MTFRQBzDdtHlrCjkf9BGhMfw/M7Wu3thlu0nBynyASxJFumwAOf1ouvGAoeaViZGQViT4LbvW81l7XtKWIwvSDCI+Z3Av7w29kti7RQtDAeDJdicxYiFP5mXStfjj8rFdlSuLXMGAOwRvOspIXIhLqxesaGDOKjKPmioeYji7w4qtb41koWNFe7bbXGuvxh4uNzmhQ3tEp70X0m2GN1/hJasZe6VZg1VyXm/1ciiIlYrJmZ+G15Z9PwqOLLnp7LoTrFsxV+Bsy5PNgNJjqQQ8o0JGsfN+uKnDzDF9RkQ+5fiVheEYWXF6WoZGeUFuWcW2VrQoeLHGIpEpn1jidGsMNkhrkEFCScsY/3jRNiuUApyZk3w3RMugJnMY3SnuaP2vupCnjPXxiVwjM1zR0EL/FrTI8JLojwXPtyonMQ9Bmg4cvsg+nWA==
x-ms-exchange-antispam-messagedata: Yj/vJzS5SYSr3/U8I8+Ff2yDLVQarTPW3wqOQO0Y61quBOhIGkQLJdi7RJrpvKukrnjWUR6OIzGrrnxasQ0q1HiNyGnMSEmGMVD5knXzejhfrAyQxrWHodCV/sj/6HKNb3fzp+IeWst/cA1Je9k57A==
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; micalg="sha-256"; protocol="application/x-pkcs7-signature"; boundary="=-uMYj4BdMtHLS1MENp5DJ"
MIME-Version: 1.0
X-OriginatorOrg: rkf-eng.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6ec6b9d1-c6f5-474e-0bd0-08d7c2e8298e
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Mar 2020 22:37:47.8422 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4ed8b15b-911f-42bc-8524-d89148858535
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 5mM9Ul2QnzYat1TllvhIRApnh+DryTVDKA29ciTCSWhPCiBx/1K7HAva64krqJzkzN64cacnFvHL8HjK8ffu+g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR13MB3134
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/RiQD3A6hGAIOZd_MR1S9cqSosZQ>
Subject: Re: [dtn] Mirja Kühlewind's Discuss on draft-ietf-dtn-tcpclv4-18: (with DISCUSS and COMMENT)
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Mar 2020 22:38:16 -0000

Mirja,
I'm including responses below with prefix "BS: "

On Thu, 2020-02-20 at 05:06 -0800, Mirja Kühlewind via Datatracker wrote:
> Mirja Kühlewind has entered the following ballot position for
> draft-ietf-dtn-tcpclv4-18: Discuss
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to 
> https://www.ietf.org/iesg/statement/discuss-criteria.html
> 
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-dtn-tcpclv4/
> 
> 
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> Thanks for this well-written document. I have a couple of thing in the comment
> section below that should be clarified. But there is one point which does not
> seem correct to me and therefore I'm raising it at thee discuss level:
> 
> Sec 5.1.1:
> "Both sides SHALL send a KEEPALIVE message whenever the negotiated interval
>    has elapsed with no transmission of any message (KEEPALIVE or other).
> 
>    If no message (KEEPALIVE or other) has been received in a session
>    after some implementation-defined time duration, then the node SHALL
>    terminate the session by transmitting a SESS_TERM message (as
>    described in Section 6.1) with reason code "Idle Timeout". "
> 
> It is not necessary that both endpoints send keepalives when TCP is used
> underneath as data is transmitted reliably. If one end sends keepalives and
> transmission fails it will close the TCP connection no matter what. Therefore
> the case where no keepalive is received, can only happen if no keepalive was
> send by the application, however, if the own keepalives are send successfully
> it is also received and the TCP connection is alive. If this is only to test
> liveness of the TCP connection, why don't you use TCP keepalives instead?
> 
> Further what happens when a keepalive fails? Should one endpoint try to
> reconnect, immediately or later when new data is available?
> 
BS: You are correct that it is not strictly necessary that both sides transmit
KEEPALIVE messages to keep the TCP connection alive. The current KEEPALIVE
behavior is inherited from TCPCLv3 and has not had any (positive or negative)
discussion in the WG so it was just kept as-is.
It's not explicitly stated, but there are no restrictions on when to re-
establish a session to an entity which has lost a session due to Idle Timeout.
Depending on local BP agent policy a preemptive session may be reinstated or the
agent may wait until a transfer is needed.

> And one more small thing:
> sec 6.1:
> "However, an entity MUST always send
>    the contact header to its peer before sending a SESS_TERM message."
> This normative requirement seems contradicting the way version failures are
> handled earlier on in the doc.
> 
BS: The contact header is always the first thing sent from either side of a new
TCP connection intended to establish a TCPCL session. A passive entity can
choose to close the TCP connection rather than sending a contact header if some
security policy dictates that, but an entity cannot send anything before a
contact header.
The graceful way to refuse a connection at the start is to send a contact header
(with some desired version number, but it really doesn't matter) and then either
close the TCP connection or send a SESS_TERM. This is described in section 4.3
"Contact Validation and Negotiation". I don't see the discrepancy between these
sections.

> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> 1) Sec 4.1:
> "Therefore, the entity MUST retry the
>    connection setup no earlier than some delay time from the last
>    attempt."
> It would be good to provide a recommended value or at least a minimum value.
> 
BS: This would seem to be quite network dependent. I can see making a
recommendation for a minimum initial delay of 1 second, but that's quite
arbitrary.

> 2) Similar here in sec 4.1:
> " If the
>    passive entity does not receive a Contact Header after some
>    implementation-defined time duration after TCP connection is
>    established, the entity SHALL close the TCP connection."
> It would be good to provide some default value or at least some more
> discussion
> about ranges of values. In any case this value should be larger than X times
> the RTT as TCP segments can get lost any might need to be transmitted. I guess
> something in the order of second would be appropriate?
> 
BS: For an earlier comment I added a very wide bound for this:
Entities SHOULD choose a Contact Header reception timeout interval no 
longer than 10 minutes (600 seconds).

> 3) Sec 4.3:
> " To prevent a flood
>    of repeated connections from a misconfigured application, an entity
>    MAY elect to hold an invalid connection open and idle for some time
>    before ending it."
> Not sure why you need to hold it open...? All you need is to not accept but
> ignore new connections from that peer/IP address for some time. And more
> questions:
>   - When kept open and you suddenly received a valid message, should you
>   process it? - And when  you finally decide to close the connection, how do
>   you do that? TCP RST, or FIN? - Do you send (TCP) keepalives?
> 
BS: This requirement was a hold over from TCPCLv3 and I'm not exactly sure the
rationale either. It does make sense to handle this as a firewall-type rule to
disallow new connections from that peer. I don't know that this warrants a TCPCL
requirement though, that seems more generic firewall activity.

> 4) Also 4.3:
> "   The first negotiation is on the TCPCL protocol version to use.  The
>    active entity always sends its Contact Header first and waits for a
>    response from the passive entity.  The active entity can repeatedly
>    attempt different protocol versions..."
> If you read on in this section it seems like the receiver always sends a
> SESS_TERM if the version is not compatible. So I assume you mean the active
> entity can open a TCP and try again. And I assume it should do it immediately
> after the SESS_TERM is received. I believe that's what the following
> paragraphs
> say but this part confused me a bit. So might be only an editorial issue.
> Please clarify! However, if there would be any attempt to send another CH on
> the same TCP connection, that could lead to ambiguity and would need to be
> further specified. Also more point, the text does not specify what the
> receiver's response to the CH is. The figure shows that it will also send a
> CH,
> however, that should also be spelled out in the text!
> 
BS: I edited this paragraph from an earlier comment and clarified that a contact
header send is one-for-one with a TCP connection. The Section 4.1 was also
updated to have specific sequencing SHALL statements.
Here is the new Section 4.3 text for reference:

The first negotiation is on the TCPCL protocol version to use.
The active entity always sends its Contact Header first and waits for
a response from the passive entity.
During contact initiation, the active TCPCL node SHALL send the highest TCPCL
protocol
version on a first session attempt for a TCPCL peer.
If the active entity receives a Contact Header with a lower
protocol version than the one sent earlier on the TCP connection,
the TCP connection SHALL be closed.
If the active entity receives a SESS_TERM message with reason of
"Version Mismatch", that node MAY attempt further TCPCL sessions with the
peer using earlier protocol version numbers in decreasing order.
Managing multi-TCPCL-session state such as this is an implementation matter.

> 5) sec 4.4.1:
> "When present, the SNI SHALL contain the same host name
>       used to establish the TCP connection."
> Not sure what this means... how do you use an host name in an TCP connection?
> Do you mean the same host name that has been used in name resolution to get
> the
> IP address that is used to establish the TCP connection? Or something else?
> 
BS: Yes, I've combined the two requirements here to read:

When a resolved host name was used to establish the TCP connection, the TLS
ClientHello SHOULD include a Server Name Indication (SNI) in accordance with
[RFC6066] containing that host name (of the passive entity) which was resolved.

> 6) sec 5.1.2:
> What is the entity receiving the MSG_REJECT supposed to do?
> 
BS: The intent of this message is for troubleshooting only. A likely use of
MSG_REJECT is that the message type was unknown to the peer and the reject
sender has already closed the TCP connection.

> 7) sec 5.2.3: General question on the ACK mechanism: As you say correctly the
> fact that you don't get a notification is not a TCP protocol matter but only
> an
> interface matter. E.g. if taps would be used, this information would be
> available. Was it considered to make the ACK mechanism optional, e.g. by using
> a flag in the XFER_SEGMENT to request an ACK per segment? Also more questions:
>  - Why are the message flags reflected?
>  - Why is the Acknowledged length field needed if there needs to be one ACK
>  (send in order) for each segment anyway?
> 
BS: The use of XFER_ACK is supposed to indicate a stronger state than just "the
peer received these messages on the TCP stream. It's supposed to indicate that
the segment of data has been fully processed, which includes indication to the
BP agent (and potentially persistence in the agent for reactive fragmentation
purposes).

There was some discussion about negotiating the use of ACK or similar parameters
but the WG consensus was to keep the protocol with as few negotiated behaviors
as possible. The Segment MRU parameter and associated XFER_SEGMENT data size
determine how much data each XFER_ACK covers so that is in a way negotiation of
"when to use XFER_ACK". As stated elsewhere in the document, it is possible to
send an entire transfer in a single segment which is the least overhead for
XFER_SEGMENT and the least number of XFER_ACK per transfer (exactly one).

The repetition of the flags is not strictly necessary but is a holdover from
TCPCLv3. The ACK length is also a holdover and is redundant as you mention, but
it is helpful from a troubleshooting perspective.

> 8) sec 5.2.4: Can you maybe explain why the XFER_REFUSE is a message/feature
> of
> the CL and not the BP?
> 
BS: It's really just to allow interrupting a transfer at a lower layer than the
BP agent for data handling issues like insufficient storage. It also allows a
large bundle transfer to be interrupted if the receiver won't accept it for
routing or other reasons after the bundle header is received and decoded (but
the rest of the bundle payload is not yet received).

> 9) sec 5.2.4:
> "If a sender receives a XFER_REFUSE message, the sender
>    MUST complete the transmission of any partially sent XFER_SEGMENT
>    message.  There is no way to interrupt an individual TCPCL message
>    partway through sending it."
> Not sure if use of normative language is appropriate here, because I believe
> what you mean is that as soon as the data/message is given to the TCP
> connection, you can't call it back. That's just a fact and nothing the sender
> may or can enforce. However, it could reset the TCP connection effectively but
> that probably not what is desired. Please clarify or remove normative
> language!
> 
BS: This text was a holdover from earlier TCPCLv3. I agree that this is not
strictly a protocol requirement, but it is an important implementation concern
that once the header portion of a message is sent the entire message needs to
follow so that the receiver can properly decode the subsequent messages.
Would simply replacing the "MUST" with a "has to" be reasonable?

> 10) sec 5.2.5.1: Can you further explain what the use case ifs for the
> Transfer
> Length Extension? When do you expect the actual length to be different?
> 
BS: The purpose is not to provide redundant data but to indicate the total
length to the receiver at the start of transfer so that the receiver may
validate or pre-allocate storage for the transfer.
In a trivial implementation each transfer is a single segment and the total
length is implied by the segment data length.
This was made into an optional extension because there are some uses of TCPCL
which either use single-segment transfers or which don't need to pre-allocate
storage.

> 11) sec 6.1:
> "   After sending a SESS_TERM message, an entity MAY continue a possible
>    in-progress transfer in either direction."
> Why is this necessary? Why can the entity not just send the SESS_TERM after
> the
> end of the transfer? Please clarify in the doc!
> 
BS: I'm adding text to Section 6 to clarify, but here is the paragraph:

This section describes the procedures for terminating a TCPCL session.
The purpose of terminating a session is to allow transfers to complete
before the session is closed but not allow any new transfers to start.
A session state change is necessary for this to happen because transfers
can be in-progress in either direction (transfer stream) within a session.
Waiting for a transfer to complete in one direction does not control
or influence the possibility of a transfer in the other direction.
Either peer of a session can terminate an established session at any time.

> 12) 6.1:
> " When performing an unclean shutdown, a receiving node
>    SHOULD acknowledge all received data segments before closing the TCP
>    connection."
> What do you mean here? TCP acknowledgements? If so, this should not be
> normative as TCP will do that not matter what. However, you can not send any
> new application data/CL ACK after a TCP FIN was sent. Please clarify!
> 
BS: I clarified this to "... SHOULD acknowledge all received XFER_SEGMENTs with
an XFER_ACK ..." Does this make sense?

> 13) sec 6.1:
> "   If a session is to be terminated before a protocol message has
>    completed being sent, then the node MUST NOT transmit the SESS_TERM
>    message but still SHALL close the TCP connection. "
> Not sure how this case is supposed to happen. When give a message to your TCP
> stack it will send it. If sending fails on the TCP level, the connection will
> be closed automatically. Or do I misunderstand the intended scenario here?
> 
BS: This requirement really applies to a situation where an entity really really
needs to end a session promptly and doesn't have time to wait for an earlier
message to complete and the SESS_TERM handshake to finish. Maybe the word
"terminated" here needs to be replaced by some other term? "closed"?