Re: [tcpm] MSL 120sec still a good value?

"touch@strayalpha.com" <touch@strayalpha.com> Fri, 11 November 2022 17:04 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B25CC15256C for <tcpm@ietfa.amsl.com>; Fri, 11 Nov 2022 09:04:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.325
X-Spam-Level:
X-Spam-Status: No, score=-1.325 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vDiKdYlRd-7q for <tcpm@ietfa.amsl.com>; Fri, 11 Nov 2022 09:04:09 -0800 (PST)
Received: from server217-2.web-hosting.com (server217-2.web-hosting.com [198.54.115.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B6E00C14CF00 for <tcpm@ietf.org>; Fri, 11 Nov 2022 09:04:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=bJRew3CC+ayf3dj9HSq93u9nehyrONPQqlIidmUsH3M=; b=pIeghYgZDwkJSS/Zt3/W0fFizQ JDgb0kPXqYkNLq47sZP9NYGa7m0SwVccx7Q3MvDu7t29O59eU9U9UFnF8MkHGq0F/p8fVtMarhkba ywxkwn6ssZRUz4tbnYu3Tqhg8on7EbyjNyAfpEK6+41Sh0Z9gegxlpowzxmOMKlOYO5Tp1VZYb23F jR3oQx2+TqY0nBfloRPPMykLUYGDl8kfulFKanWEOAn0RpmmV/FVyuKlAZBNe0WyrLFcw01H+6tYh VXyziq2+rkUL1WU/OeiJw0dVtIZ1G+G2DrWNlLLJwg79u6PLOOwQq3dKGdNd6cXDf7sXyyLqC9Z9O fCyWKRfg==;
Received: from cpe-172-114-237-88.socal.res.rr.com ([172.114.237.88]:50248 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from <touch@strayalpha.com>) id 1otXRf-004beq-Dt; Fri, 11 Nov 2022 12:04:04 -0500
Content-Type: multipart/alternative; boundary="Apple-Mail=_1D389876-5E52-40C0-9681-7649FCF86452"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.200.110.1.12\))
From: "touch@strayalpha.com" <touch@strayalpha.com>
In-Reply-To: <FDF35F4C-E175-4385-9AC4-A7D862201E92@gmail.com>
Date: Fri, 11 Nov 2022 09:03:47 -0800
Cc: Michael Tuexen <tuexen@fh-muenster.de>, tcpm <tcpm@ietf.org>
Message-Id: <9A82B521-1E83-4E08-87F1-EE23BEC58738@strayalpha.com>
References: <2B33D130-81A8-4CB5-8CA1-E0D932906DCA@fh-muenster.de> <FDF35F4C-E175-4385-9AC4-A7D862201E92@gmail.com>
To: Jonathan Morton <chromatix99@gmail.com>
X-Mailer: Apple Mail (2.3731.200.110.1.12)
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/0bZJyEesuaLbDVC-jKnN8LaxlNc>
Subject: Re: [tcpm] MSL 120sec still a good value?
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Nov 2022 17:04:14 -0000


> On Nov 9, 2022, at 4:07 PM, Jonathan Morton <chromatix99@gmail.com> wrote:
> 
>> On 9 Nov, 2022, at 5:39 pm, tuexen@fh-muenster.de wrote:
>> 
>> quick question for TCP implementers:
>> TCP end points stay in TIMEWAIT for 2 MSL and RFC 9293 says MSL is 120 sec.
>> Is this still a good value anymore? Wouldn't it make sense to use the maximum
>> round trip time observed on the connection or some multiple of it?
>> Any information how implementations do it right now appreciated.
> 
> IIRC, the reason for TIMEWAIT is to guard against the possibility of packets caught in a routing loop and later released.

See:
Faber, T.; Touch, J.; Yue, W.
The TIME-WAIT state in TCP and Its Effect on Busy Servers <> Inproceedings
In: Infocom, pp. 1573-1583, IEEE, 1999

It’s more than just routing loops - it’s also things like reboots.

>  The period of 2x120 seconds is derived from the maximum value of the TTL field and the assumption that the "time" may be one second per TTL decrement.

Per RFC791 and RFC1812, IPv4 TTL is supposed to be decremented at least once a second, but also no less than once per forwarding operation. When time is being ignored, it counts routers (not links). I.e., a packet with a TTL of zero should successfully traverse a link (or switched LAN).

> However, TTL has rarely if ever been decremented more than once per hop when the delay exceeded 1 second at any given hop.  Additionally, TTL must be decremented by at least one per hop even when the delay is much less (by orders of magnitude) than one second at that hop.  This makes the term "time" in the name of the TTL field farcical.

It was accurate as intended when written; perhaps what is farcical is how some implementers have ignored it - because, as you note, this has implications elsewhere (TIME-WAIT, but also receiver reassembly).

> I think the question we should ask is: how robust are today's TCP implementations against packets released from a routing loop?  Is this risk therefore small enough that TIMEWAIT can be reduced to, say, some multiple of the (expected or measured) path RTT, or calculated in a similar way to RTO?

Servers already ignore TIME-WAIT for their own convenience - since the 1990s, as noted in the paper above. There are already other ways to address this, e.g., RFC6191. The only issue is that this RFC assumes clocks.

That said, why is this an issue that needs to be addressed further?

Joe

—
Dr. Joe Touch, temporal epistemologist
www.strayalpha.com