Document Action: 'Improving the Robustness of TCP to Non-Congestion Events' to Experimental RFC

The IESG <iesg-secretary@ietf.org> Mon, 01 May 2006 21:48 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1FagGH-00025Q-Kf; Mon, 01 May 2006 17:48:57 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FagGF-00025A-T1; Mon, 01 May 2006 17:48:55 -0400
Received: from willow.neustar.com ([209.173.53.84]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FagGF-0006dz-Kb; Mon, 01 May 2006 17:48:55 -0400
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by willow.neustar.com (8.12.8/8.12.8) with ESMTP id k41Lmp9W004907 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 1 May 2006 21:48:51 GMT
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1FagGB-0005nG-RV; Mon, 01 May 2006 17:48:51 -0400
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1FagGB-0005nG-RV@stiedprstage1.ietf.org>
Date: Mon, 01 May 2006 17:48:51 -0400
X-Spam-Score: 0.1 (/)
X-Scan-Signature: b4a0a5f5992e2a4954405484e7717d8c
Cc: tcpm mailing list <tcpm@ietf.org>, Internet Architecture Board <iab@iab.org>, tcpm chair <faber@isi.edu>, tcpm chair <mallman@icir.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: Document Action: 'Improving the Robustness of TCP to Non-Congestion Events' to Experimental RFC
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ietf-announce.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
Errors-To: ietf-announce-bounces@ietf.org

The IESG has approved the following document:

- 'Improving the Robustness of TCP to Non-Congestion Events '
   <draft-ietf-tcpm-tcp-dcr-07.txt> as an Experimental RFC

This document is the product of the TCP Maintenance and Minor Extensions 
Working Group. 

The IESG contact persons are Lars Eggert and Magnus Westerlund.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcp-dcr-07.txt

Technical Summary
 
   This document specifies Non-Congestion Robustness (NCR) for TCP. 
   One of the ways TCP detects loss is using the arrival of three duplicate
   acknowledgments. However, this heuristic is not always correct, notably
   in the case when network paths reorder segments.  TCP-NCR is designed
   to mitigate this degraded performance by increasing the number of
   duplicate acknowledgments required to trigger loss recovery, based on
   the current state of the connection, in an effort to better disambiguate
   true segment loss from segment reordering.
 
Working Group Summary
 
   This draft has attracted considerable interest in the WG, with many
   different people commenting on reviewing various iterations. The
   consensus was that although the specific benefits of the NCR
   extensions remain to be investigated, the mechanism itself is
   suitably ready for publication as an Experimental RFC.
 
Protocol Quality
 
   PROTO Shepherd: Ted Faber (faber@isi.edu)

   The Gen-ART reviewer (Eric Gray, eric.gray@marconi.com) has found this
   ready for publication as an Experimental RFC.

   Chris Lonvick (clonvick@cisco.com) has reviewed this draft for the
   Security Directorate.

   Lars Eggert has reviewed this spec for the IESG.

Note to RFC Editor

Section 7, the only paragraph

OLD:
    We do not believe there are security implications involved with TCP-
    NCR over and above those for general TCP congestion control
    [RFC2581].  In particular, the Extended Limited Transmit algorithms
    specified in this document have been specifically designed not to be
    susceptible to the sorts of ACK splitting attacks TCP's general TCP
    congestion control is vulnerable to (as discussed in [RFC3465]).

NEW:
    General attacks against the congestion control of TCP are described
    in [RFC2581].  SACK-based loss recovery for TCP [RFC3517] mitigates
    some of the duplicate ACK attacks against TCP's congestion control.
    This document builds upon that work, and the Extended Limited
    Transmit algorithms specified in this document have been designed to
    thwart the ACK division problems that are described in [RFC3465].

(I.e., just replace the entire paragraph.)


_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce