Re: [tcpm] Please read

Matt Mathis <mathis@psc.edu> Fri, 01 August 2008 18:47 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 14A7B3A68CE; Fri, 1 Aug 2008 11:47:08 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C10553A6938 for <tcpm@core3.amsl.com>; Fri, 1 Aug 2008 11:47:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.829
X-Spam-Level:
X-Spam-Status: No, score=-1.829 tagged_above=-999 required=5 tests=[AWL=-0.770, BAYES_00=-2.599, SARE_LWHUGE=1.54]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SDwdqE2NoGtr for <tcpm@core3.amsl.com>; Fri, 1 Aug 2008 11:47:05 -0700 (PDT)
Received: from mailer2.psc.edu (mailer2v6.psc.edu [IPv6:2001:5e8:2:42::6a]) by core3.amsl.com (Postfix) with ESMTP id 3C3E73A68CE for <tcpm@ietf.org>; Fri, 1 Aug 2008 11:47:05 -0700 (PDT)
Received: from tesla.psc.edu (tesla.psc.edu [128.182.58.233]) by mailer2.psc.edu (8.14.2/8.13.3) with ESMTP id m6VMHtUS003005 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 31 Jul 2008 18:17:55 -0400 (EDT)
Received: from localhost.psc.edu (localhost.psc.edu [127.0.0.1]) by tesla.psc.edu (8.13.1/8.13.1) with ESMTP id m6VMHtdu008981; Thu, 31 Jul 2008 18:17:55 -0400
Date: Thu, 31 Jul 2008 18:17:55 -0400
From: Matt Mathis <mathis@psc.edu>
To: Mahesh Jethanandani <mahesh@cisco.com>
In-Reply-To: <4891FB44.50704@cisco.com>
Message-ID: <Pine.LNX.4.64.0807311808300.30758@tesla.psc.edu>
References: <4891FB44.50704@cisco.com>
MIME-Version: 1.0
Cc: tcpm@ietf.org
Subject: Re: [tcpm] Please read
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

Doesn't this create a huge opportunity for a DoS attack, since an attacker can 
send requests with forged from addresses, and the server has to burn cycles 
and/or commit memory, when it is never going to see the next packet?

I believe that this problem is fundamental to anything that is piggybacked on 
the SYN and has killed every attempt at using the handshake to eliminate later 
transactions.  The server wants to know for sure that the client is alive and 
responding before committing more than incidental resources (e.g. SYN queue, 
constructing a SYN-cookie, etc) to the connection.

Thanks,
--MM--
-------------------------------------------
Matt Mathis     http://staff.psc.edu/mathis
Work:412.268.3319    Home/Cell:412.654.7529
-------------------------------------------

On Thu, 31 Jul 2008, Mahesh Jethanandani wrote:

> During the TCPM meeting in Dublin, Wes wanted to encourage readers on this 
> mailing list to read the short (2 pages if you remove the boiler plate part) 
> draft on "Clarification of Sender Behavior Under Persist Condition" draft.
>
> To enable a quick read, I have cut and pasted the relevant sections here. As 
> noted in the meeting, this draft  tries to clarify the sender behavior 
> without getting into the details of the DoS scenario and the possible 
> solutions. Just to reiterate, it is this draft and not the original persist 
> draft that we are trying to table for adoption as a WG item.
>
> 1.  Introduction
>
>  RFC 1122 [RFC1122] Section 4.2.2.17, page 92 says that: A TCP MAY
>  keep it's offered receive window closed indefinitely.  As long as the
>  receiving TCP continues to send acknowledgments in response to the
>  probe segments, the sending TCP MUST allow the connection to stay
>  open.  The RFC goes on to say that it is important to remember that
>  ACK (acknowledgment) segments that contain no data are not reliably
>  transmitted by TCP.  Therefore zero window probing SHOULD be
>  supported to prevent a connection from hanging forever if ACK
>  segments that re-opens the window is lost.  The condition where the
>  sender goes into the ZWP mode is typically known as the persist
>  condition.  The problem is applicable to TCP and TCP derived
>  transport protocols like SCTP.
>
>  A consequence of adhering to the above requirement mandated by RFC
>  1122 is that multiple TCP receivers (clients) advertising a zero
>  window to a busy server indefinitely (by reliably acknowledging the
>  ZWP), could exhaust the connection and buffer resources of the sender
>  (server).  In such cases, to achieve robustness, the system should be
>  able to take appropriate action on those TCP connections and reclaim
>  resources.  The purpose of this document is to clarify that such
>  actions are in the spirit of RFC 1122 and they don't violate RFC
>  1122.  The remainder of the document briefly describes the DoS
>  scenario, analyzes the current verbiage surrounding the ZWP in RFC
>  1122 and attempts to disambiguate the notion presented by RFC 1122.
>
> 2.  Discussion
>
>  Having the sender accumulate buffers and connection table entries
>  when the receiver has deliberately and maliciously closed the window
>  ultimately leads to resource exhaustion on the sender.  This
>  particular dependence on the receiver to open its zero window can be
>  easily exploited by a malicious receiver TCP application to launch a
>  DoS attack against the sender.  In this scenario the sender's
>  legitimate connections do not get established and already established
>  well behaved TCP connections are unable to transmit any data.  The
>  sender enters the persist condition and is stuck waiting indefinitely
>  for the receiver to open up its window.
>
>  To illustrate this, consider the case where the client application
>  opens a TCP connection with a HTTP [RFC2616] server, sends a GET
>  request for a large page and stops reading the response.  This would
>  cause the client TCP to advertise a zero window to the server.  For
>  every large HTTP response, the server is left holding on to all the
>  response data in it's send queue.  If the client never clears the
>  persist condition, the server will continue to hold that data
>  indefinitely.  Multiple such TCP connections stuck in the same
>  scenario on the server would cause resource depletion resulting in a
>  DoS situation on the server.
>
>  In such scenarios it should be possible for the application or the
>  system or a resource management entity to instruct TCP to terminate
>  connections stalled in the persist condition.  These actions are
>  necessary to prevent resource exhaustion on the server.
>
>  An extensive discussion took place recently about this issue on the
>  TCPM WG mailing list [TCPM].  The general opinion seemed to be that
>  terminating a TCP connection in persist condition does not violate
>  RFC 1122.  In particular the operating system, a resource manager, or
>  an application can instruct TCP to abort a connection in the persist
>  condition.  TCP itself SHOULD not take any action and continue to
>  keep the connection open as mandated by RFC 1122 unless otherwise
>  instructed to do so.  The exact mechanism by which the instruction to
>  abort the connection is conveyed to TCP is an implementation decision
>  and falls beyond the scope of the current memo.  To determine which
>  TCP connection to abort the entity can use the connection attributes
>  obtained from some interface similar to STATUS call mentioned in RFC
>  793.
>
>
>
>
>
>
>
>
> -- mahesh
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm
>
_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm