Re: [hackathon] IETF 118 Hackathon: Are long-lived TCP sessions a problem for (DNS) statistics?

Jerry Lundström <jerry@dns-oarc.net> Wed, 01 November 2023 14:47 UTC

Return-Path: <jerry@dns-oarc.net>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 516F6C15109A for <hackathon@ietfa.amsl.com>; Wed, 1 Nov 2023 07:47:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.906
X-Spam-Level:
X-Spam-Status: No, score=-6.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rIS6UXZss5_Z for <hackathon@ietfa.amsl.com>; Wed, 1 Nov 2023 07:47:54 -0700 (PDT)
Received: from ix1.dns-oarc.net (ix1.dns-oarc.net [IPv6:2620:ff:c000::198]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 64BF0C14CE45 for <hackathon@ietf.org>; Wed, 1 Nov 2023 07:47:54 -0700 (PDT)
Received: from [172.17.0.4] (78-73-34-210-no600.tbcn.telia.com [78.73.34.210]) (authenticated bits=0) by ix1.dns-oarc.net (8.14.4/8.14.4/Debian-8+deb8u2) with ESMTP id 3A1ElnVa009465 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for <hackathon@ietf.org>; Wed, 1 Nov 2023 14:47:52 GMT
Message-ID: <eec141c6-b442-4cea-b888-886c1c74c017@dns-oarc.net>
Date: Wed, 01 Nov 2023 15:47:49 +0100
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: hackathon@ietf.org
References: <622eef00-5802-437c-bf6e-26b523bf5df5@dns-oarc.net> <abf0f8b0-76eb-4b06-9faf-6c8119f1405e@gmx.at> <CAHw9_iJifEf8J+7mg0xh6WYnF11jeTRS-ow9JTRgzVuswt7bCA@mail.gmail.com> <CA+syWAOLqz3WjYKD17sn-k0NGFaxbY-jL92fBrVvKDAZcu1dqQ@mail.gmail.com>
From: Jerry Lundström <jerry@dns-oarc.net>
Autocrypt: addr=jerry@dns-oarc.net; keydata= xsFNBFa63hwBEADrRApCsSitpKccpkfmsr03bec/1hxvM8gr3No1WAz58IqcoXRORxQKnd+u Woe+xK1tfgGx7IfBoaESy49x/zJQ2ct90eOdmFRvJEdv7iUJJ7imQoc9gUWbwa6S9bBY7+9Q hETw7Z1P4dJV6vE3+IAkgD1qkZbE+O4O5mDGkIiwLVHd/EJCWfWOSgcfHCafrw9Y1DXz8xvD 5tPhvGBoVSdqrMKp7LB+UwmppLUAiS1K4CWk5LsNezQtDMgqn8ifQc0gViL80BjPUg5OnQax N4ZF2xukCdpAULWHNOqboS9QcP6gVlKWCjzfzdjIvTgYFKZJlBoHiZ/seCubkiLSpedrq6g1 ZDUjZhTDyVZKd2zbij1F0kaQ8UP4svAMCpNl7wN+OU3DmlbeTwJDr9dyAOWm7PSQmhE/GSxg ER/bTPV5lOWiPSB5QMlZM6G62ZuHH44LYrQLzIfPlWTze1huD84uL+8O5sGhCMWPW3vIa3kR G0CYSuf2rb6gIgzYxYzt85ThnnlH5n1u3+sPmpeqhmwCeJThbSBNP0w/YNVZGtRZyb/+pdgE eBttKa/CuL7ErhcCLN6k8cvrovaP5i3AE+gMleX1N2HTKamrHnNsUNUtcybmZNX2cftkiN/f YWU3uHiSrcPhSlL7wt++VBoCxKEIBqlHmf0DQEAFF0zGTIyD/QARAQABzSVKZXJyeSBMdW5k c3Ryw7ZtIDxqZXJyeUBkbnMtb2FyYy5uZXQ+wsGABBMBCAAqAhsDBQkSzAMABQsJCAcDBRUK CQgLBRYDAgEAAh4BAheABQJWuuUUAhkBAAoJEBm20lOjVrS7GvQQANTr12kw0WGN9zejhL9y /ZLp6QAizBO4v4qbcZkpBnOJ90M/jNXwfOrVGbfdpPUgbikGYjwEksZ/xVMxAiNWySQ5cUlL DV4gmGX/UVibZxFgq7e57QIeEvN3ugDgGnQiIHQ8nE2R6j3MJmFIyRau+CboTIFF4ycu5nZ0 6OBniuDrA9TNADLrvaSA/aM5V6rF6LVyTvaKt8TYATIafISEe2QmDvjEkBcGUc5+P0Mi5HYK FCWDopQ6vH9EEqpV8ETlpknkFMBtjLRaIHgexMUJdtqcHBkSDHvt+wRkJImGSSiD1pclLRmV VIE79q7kWwxTWkLI+JuOcmV3t4+j/Jvk5RwhtpHZH2S0UyHW5Lcvpzw6YejIqEjr4MGtAJR7 YoKMlOLykQywEKjtfoWRDKfQlcEsZx4LGKZlVBcuHbsCaFtuewf91VUXkK3p8RlgX2lAYCNb qDmp+PV5qUhI+kA/We3PR+3hca6hRh4Ngm1tlUFSzMG2p6/AYmDoqfWqCvXy/q/ayGV7FaQW JLcvu+vXiXQaH5bZKnCcatLXiP++cJIwXRCll3cCqI0/aowYv29n40i+jYv7hhfLgyAYn1zS vbAYKoFKMjl/RCNFX5rr7SGn1v971gBD+W5q74SMcB4GkxIfowmyjuPfSQrVWqnoff9YXb23 xq9cgkyAfoTlHV10zsFNBFa63hwBEADyhPjsTlIgHrTg56Z/1odZ+qoMVFS1lUXpk9hU7Zw6 VdBXNvcJH5L8fAFPdootNQParoz5L20P4m9CqMMxnkhiEIbAU8a7mNYpqYBZnXjvxBlQJd+T iJa6gKFCRC6IlfrXAnxMBAo442lBtwqONtz0kEWqH4U2CJGTJA2mR3fl9MEo7qF9s1ZpcauF L4g2ktnPL0tqSeQRHN+PHXvNrTFzBV7qOv14pqtUcyYaTi14GN/5ZpBIyuVWogfwdltHH9nS oFkn3FEMtBZaPcQhyKMah0Ke1AjIgo7MbzodMvxDzjLnIapgkB2qg8tSdCna2UHb4rHGTv7J A38tgaDYxm/MIlfrZtpTsFfxdCli8D01vA8CedLzSz7KmfXSNbTfjqXDNOTXIsfq00pssDl0 cs3bRS2vEEbtu+TZpEy+G7KjdbQL0ZQ7d/qFmVvaCm8qm/EkgZUgC7mqhnbXBoopvysLy/rM EpCG98rH404CBVG5vSgU+LGJDqo30wAA3T6XPcEzyAgGxtW1v9or6ube8W05YD5sekDBHtB9 aaTRzFY4iozkPK5pWMRFiEJBf69tTr0lSrG6i5GEf+oCip0mFsWTKQkOIZVCjQd4jW4SGPB5 M3JTs50Uc5bCJDjjRKym2/FTgkpJwQzuAedmWiIAp3SzQcy3dipmljWIyThK96on1QARAQAB wsFlBBgBCAAPBQJWut4cAhsMBQkSzAMAAAoJEBm20lOjVrS72q8P/jRVi0W6AZQW22yCn8Ds m6XPCpNxcUYFQuDJEtHQS28t+Um/LnWy3sTuPx8c8B2nt761kEZsuar9V0/7vpr2zasMjvda DuKs7fBu/dqw9Wq73P6c1Khuvku0PVACPHwOmEf/2U5YtCqrwk1qIzK+OEs0RiPgz8/AeyV1 /kRiQ2SNc4v6NKwl6QO6AIJPkZ4NMxhb8CQbOGb0tOpCb76GrMI2hh7lKv1NXWOlHaNmQ7V6 Rbswk8e9RCMruLB0+izqyvC96KPWyktjP5WlvpU4uYT7XztJLGGZ1a2B6tLkVsEgVcOMb2Uf ukRzyDFxxhHL06dfFcLDCy0YuaXLiZOle+whma7RKV/AaiFarZuSBN3y+OweefN51ny+Jtth rMY25Yq04Ga+JoHzhPgDTBe2GjdB4hWvHWsF5swlXRd+bWf7bIo65yT+/r7sxoArFRMPPPdD CvYGQ7MdKpKMMWgFiEJCpgs/pcFN/dxb9+fOv9ihgKGG/Xsyath5FSExiXdM79zGln42XiTs DgBNB9niPYiz92EIBNMbT1ZfQXUIQi5qiLw5G9dsVNF9eCfT+LVPj0o3d4HtIWSu1DmWAfyS VG99N8DB5z3z+WfA1XU7TH0sjGnlknBz8MR7qiA0owki9BQusO4yr1JNfnzrSjVH0NjocVVX TPh2hDmBsGc+/FH2
In-Reply-To: <CA+syWAOLqz3WjYKD17sn-k0NGFaxbY-jL92fBrVvKDAZcu1dqQ@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/FQGwf2tgj1YeDLPmPFQJJwgEGrQ>
Subject: Re: [hackathon] IETF 118 Hackathon: Are long-lived TCP sessions a problem for (DNS) statistics?
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Nov 2023 14:47:59 -0000

Hi all,

I will not be able to join the hackathon physically so I've created a 
chat channel [1] to discuss the project during the hackathon. If you're 
interested to work on this then please join.

Cheers,
Jerry

[1] https://chat.dns-oarc.net/community/channels/ietf118-hackathon-lltcp

On 10/9/23 13:58, guest271314 wrote:
> This is a topic I'm interested in. I think we can test this to get
> empirical data.
> 
> On Fri, Oct 6, 2023 at 8:56 AM Warren Kumari <warren@kumari.net> wrote:
> 
>>
>>
>>
>>
>> On Fri, Oct 06, 2023 at 4:30 AM, <rs.ietf@gmx.at> wrote:
>>
>>> I don't have data ready to share, but i want to point out that in the
>>> storage space (NFS; SMB; iSCSI; NVMe/TCP; iWARP) - which is not necessarily
>>> on the public internet though, it is the norm rather then the exception to
>>> have TCP sessions being active for days and weeks at a time - typcially
>>> only reestablished after some more or less severe disruption (hosts
>>> rebooting, ports failing, excessive packet discards...).
>>>
>>
>>
>> I think that this is also true for a bunch of VPN / tunneling
>> technologies.
>>
>> For example, I've had a number of enterprise site-to-site "SSL Tunnels"
>> which have been up for many many months, as well as a bunch of SSH tunnels
>> (and just sessions) for similar times. In fact, I recently stumbled across
>> an SSH connection to a terminal server which had been up for a few years —
>> someone had SSHed from a console server to a termserver, and then
>> disconnected, leaving the session up indefinitely.
>>
>> W
>>
>>
>>> I can not comment on DNS/TCP sessions though.
>>>
>>> Best regards,
>>> Richard
>>>
>>> Am 06.10.2023 um 09:27 schrieb Jerry Lundström:
>>>
>>> Hi all,
>>>
>>> Some tools uses packet capturing to do statistics for DNS and some of
>>> them needs to see the beginning of the TCP sessions. If resolver systems
>>> out there start keeping TCP session against authorities open for a very
>>> long time (days or weeks) then it might become a problem for these tools.
>>>
>>> We would like to look at two things;
>>> 1) First to poke at data to see if there are very long-lived TCP sessions
>>> out there today, or not(!) which is equally interesting to know.
>>> 2) Second to survey DNS statistics tools out there to see how they handle
>>> long-lived TCP sessions to understand how wide a problem this might be, if
>>> any. And maybe fix some of them if issues are spotted when doing this.
>>>
>>> Sounds interesting? Do you have data to poke at? Hope to see you at the
>>> hackathon then! :)
>>>
>>> Cheers,
>>> Jerry Lundström & Roy Arends
>>>
>>> _______________________________________________
>>> hackathon mailing list
>>> hackathon@ietf.org
>>> https://www.ietf.org/mailman/listinfo/hackathon
>>> Unsubscribe: mailto:hackathon-request@ietf.org?subject=unsubscribe
>>> <http://hackathon-request@ietf.org/?subject=unsubscribe>
>>>
>>> _______________________________________________
>>> hackathon mailing list
>>> hackathon@ietf.org
>>> https://www.ietf.org/mailman/listinfo/hackathon
>>> Unsubscribe: mailto:hackathon-request@ietf.org?subject=unsubscribe
>>> <http://hackathon-request@ietf.org/?subject=unsubscribe>
>>>
>>
>> _______________________________________________
>> hackathon mailing list
>> hackathon@ietf.org
>> https://www.ietf.org/mailman/listinfo/hackathon
>> Unsubscribe: mailto:hackathon-request@ietf.org?subject=unsubscribe
>>
> 
> 
> _______________________________________________
> hackathon mailing list
> hackathon@ietf.org
> https://www.ietf.org/mailman/listinfo/hackathon
> Unsubscribe: mailto:hackathon-request@ietf.org?subject=unsubscribe