Re: [tcpm] WG Last call for draft-ietf-tcpm-tcp-timestamps-00.txt

Joe Touch <touch@isi.edu> Mon, 20 September 2010 17:21 UTC

Return-Path: <touch@isi.edu>
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9F6873A68E3 for <tcpm@core3.amsl.com>; Mon, 20 Sep 2010 10:21:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.538
X-Spam-Level:
X-Spam-Status: No, score=-102.538 tagged_above=-999 required=5 tests=[AWL=0.061, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3DbWpL6hBJG4 for <tcpm@core3.amsl.com>; Mon, 20 Sep 2010 10:21:36 -0700 (PDT)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) by core3.amsl.com (Postfix) with ESMTP id 664953A69D6 for <tcpm@ietf.org>; Mon, 20 Sep 2010 10:21:31 -0700 (PDT)
Received: from [75.217.186.37] (37.sub-75-217-186.myvzw.com [75.217.186.37]) (authenticated bits=0) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id o8KHKxj0010519 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NOT); Mon, 20 Sep 2010 10:21:09 -0700 (PDT)
Message-ID: <4C9797FA.40502@isi.edu>
Date: Mon, 20 Sep 2010 10:20:58 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.9) Gecko/20100825 Thunderbird/3.1.3
MIME-Version: 1.0
To: Fernando Gont <fernando@gont.com.ar>
References: <6AA1D95C-7522-4EC0-B08F-476FD97A7D6D@windriver.com> <4C9263C1.1060605@isi.edu> <4C93A507.8040909@gont.com.ar> <4C93B202.7010409@isi.edu> <4C93C15B.9070603@gont.com.ar> <4C93EECF.3040201@isi.edu> <4C9500E4.7000300@gont.com.ar>
In-Reply-To: <4C9500E4.7000300@gont.com.ar>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: "tcpm@ietf.org WG" <tcpm@ietf.org>, David Borman <david.borman@windriver.com>
Subject: Re: [tcpm] WG Last call for draft-ietf-tcpm-tcp-timestamps-00.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Sep 2010 17:21:37 -0000

Hi, Fernando,

On 9/18/2010 11:11 AM, Fernando Gont wrote:
> On 17/09/2010 07:42 p.m., Joe Touch wrote:
>
>>>> I don't think this document should make recommendations like that. IMO,
>>>> it's more appropriate to consider the impact of non-monotonicity on the
>>>> other recommendations (which should be minor, as you note - they would
>>>> just make the mechanism fail the way it would if not used at all).
>>>
>>> Why not? For instance, this was adopted by rfc1323bis....
>>
>> I don't see this document as significant motivation on its own for a
>> SHOULD. If you want to remind readers that this is/will be a SHOULD in
>> rfc1323bis, that's fine, but for the reasons cited there.
>
> I don't follow. Why the same requirement would not be appropriate here,
> but *would* in another document?

I'm asking you to answer that question. Is that SHOULD necessary here? 
My concern is that you basically need the majority of clients to change 
their behavior to benefit, and it only benefits some servers (in 
particular, ones with high connection rates to specific hosts).

If you want to say that rfc1323bis recommends it, and this mechanism 
also benefits from it, that's easier to justify.

>>>> Also, it'd be useful to explain why some OSs randomize the timestamps
>>>> (if that's for security,
>>>
>>> Yes, the reason is security.
>>>
>>>> does it suggest that this mechanism would be
>>>> less useful in the future?)
>>>
>>> No, it doesn't. As noted in draft-gont-timestamps-generation, trivial
>>> randomization is probably not the most wise approach to unpredictability.
>>>
>>> And OpenBSD also does trivial ISN randomization rather than RFC1948...
>>> not the best possible approach, either.
>>
>> My point is that if OS's are doing randomization for security (and since
>> security concerns are increasing, that behavior may be more common),
>> doesn't this undermine your use of the timestamps because you're
>> expecting monotonicity?
>
> No, it doesn't. Just pick a good randomization scheme. Randomization
> does not necessarily mean issuing a random() call. For instance, the
> algorithm that was included in previous versions of this I-D did
> randomization, while still producing a monotonically-increasing sequence
> (a la RFC1948)

So here's the questions again:

- are you expecting randomization for security reasons to be more widely 
deployed?

AFAICT, you didn't answer that.

- does randomization interfere with your mechanism?

Yes, if it isn't also monotonic. I wouldn't characterize it as trivial 
or not; monotonicity is a specific property that has nothing to do with 
randomness directly.

So you might need to say that:

	IF randomization is applied, then this mechanism
	benefits ONLY IF that randomization is also monotonic.

If you want to include an example of such a mechanism in an appendix, 
that would be useful. (but this doc wouldn't be recommending it as a 
SHOULD, just to be clear).

...
>>>>> Do you mean I should remove the section? Rename it? Move it to an
>>>>> appendix? Please suggest a way forward....
>>>>
>>>> I think there are other corner cases from Alfred's 2009 note that could
>>>> be included, and the toplevel heading (4.) could introduce the list,
>>>> which would make the plural still applicable.
>>>
>>> I cannot find those corner cases. Could you point out the corner cases
>>> you're referring to?
>>
>> See attached.
>
> The single point that Alfred raised could probably be included in the
> processing rules already present. -- although it's a very unlikely case,
> so one could consider that as a corner case. -- any preference for any
> particular approach?

Nope.

Thanks,

Joe